<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic regular translation creation failed for protocol 50 src inside:  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733068#M531841</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled it on the ASA5510 and from what I can tell and have read its enabled by default on the 2801 as its running a IOS later than 12.2(13)T or later. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After making the change I'm still seeing the same regular translation creation failed for protocol 50 src inside:10.12.45.254 dst outside:72.21.209.225 messages in my syslogs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Brad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Sep 2011 14:07:23 GMT</pubDate>
    <dc:creator>brad.gocken</dc:creator>
    <dc:date>2011-09-06T14:07:23Z</dc:date>
    <item>
      <title>regular translation creation failed for protocol 50 src inside: dst outside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733064#M531837</link>
      <description>&lt;P style="border-collapse: collapse; list-style-type: none; margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in;"&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none; margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in;"&gt;I'm looking for some guidance on how to get a Cisco 2801, that sits behind a Cisco ASA5510 firewall, setup for ipsec tunneling capabilities to an Amazon VPC\VPN. The basic network flow is external to internal ciscoasa5510--&amp;gt;cisco6509--&amp;gt;cisco2801. I'm having issues getting the BGP peering to establish properly which is stopping the ipsec tunnel from coming up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none; margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in;"&gt;I have verified that on the 2801 that the bgp summary is showing as active and I have enabled debugging which is producing the following messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Sep&amp;nbsp; 2 18:01:34.099: BGP: 169.254.255.5 open active, local address 169.254.255.6&lt;/P&gt;&lt;P&gt;*Sep&amp;nbsp; 2 18:01:36.047: BGP: 169.254.255.1 open active, local address 169.254.255.2&lt;/P&gt;&lt;P&gt;*Sep&amp;nbsp; 2 18:02:04.099: BGP: 169.254.255.5 read request no-op&lt;/P&gt;&lt;P&gt;*Sep&amp;nbsp; 2 18:02:04.099: BGP: 169.254.255.5 open failed: Connection timed out; remote host not responding, open active delayed 23394ms (35000ms max, 60% jitter)&lt;/P&gt;&lt;P&gt;*Sep&amp;nbsp; 2 18:02:06.047: BGP: 169.254.255.1 read request no-op&lt;/P&gt;&lt;P&gt;*Sep&amp;nbsp; 2 18:02:06.047: BGP: 169.254.255.1 open failed: Connection timed out; remote host not responding, open active delayed 18005ms (35000ms max, 60% jitter)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none; margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in;"&gt;I then checked the ASA's syslogs and I'm getting the the following messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Sep 02 2011&lt;/TD&gt;&lt;TD&gt;13:01:16&lt;/TD&gt;&lt;TD&gt;305006&lt;/TD&gt;&lt;TD&gt;72.21.209.225&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;regular translation creation failed for protocol 50 src inside:10.12.45.254 dst outside:72.21.209.225&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Sep 02 2011&lt;/TD&gt;&lt;TD&gt;13:01:07&lt;/TD&gt;&lt;TD&gt;305006&lt;/TD&gt;&lt;TD&gt;72.21.209.193&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;regular translation creation failed for protocol 50 src inside:10.12.45.254 dst outside:72.21.209.193&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none; min-height: 8pt; height: 8pt;"&gt;Can someone please shed some light on what could potentially be wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none; margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in;"&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none; margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in;"&gt;Brad&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733064#M531837</guid>
      <dc:creator>brad.gocken</dc:creator>
      <dc:date>2019-03-11T21:20:24Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733065#M531838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please verify if nat-t is enabled on the router and ASA? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post the output of "sh run" from the ASA here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 18:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733065#M531838</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-09-02T18:33:35Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733066#M531839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it appears that nat-t is not enabled on the ASA. My understanding is that enabeling it is global right? Since I have a L2L currently setup to between the ASA and another remote ASA will enabling Nat-T have any affect on that established tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the current running config: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.12.35.2 255.255.255.0 standby 10.12.35.3 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 66.191.64.126 255.255.255.240 standby 66.191.64.125 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa841-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa832-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa802-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 10.12.34.11&lt;/P&gt;&lt;P&gt; name-server 10.12.34.12&lt;/P&gt;&lt;P&gt; domain-name &lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj-10.10.0.0 &lt;/P&gt;&lt;P&gt; subnet 10.10.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network obj-10.15.0.0 &lt;/P&gt;&lt;P&gt; subnet 10.15.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network obj-10.12.0.0 &lt;/P&gt;&lt;P&gt; subnet 10.12.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network obj-10.12.12.0 &lt;/P&gt;&lt;P&gt; subnet 10.12.12.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object network obj-10.12.30.15 &lt;/P&gt;&lt;P&gt; host 10.12.30.15&lt;/P&gt;&lt;P&gt;object network obj-66.191.64.115 &lt;/P&gt;&lt;P&gt; host 66.191.64.115&lt;/P&gt;&lt;P&gt;object network obj-66.191.64.124 &lt;/P&gt;&lt;P&gt; host 66.191.64.124&lt;/P&gt;&lt;P&gt;object network obj-10.12.45.254 &lt;/P&gt;&lt;P&gt; host 10.12.45.254&lt;/P&gt;&lt;P&gt;object network obj-10.12.45.254-01 &lt;/P&gt;&lt;P&gt; host 10.12.45.254&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 10.15.45.254&lt;/P&gt;&lt;P&gt; network-object host 66.191.64.124&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object host 72.21.209.193&lt;/P&gt;&lt;P&gt; network-object host 72.21.209.225&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object ip &lt;/P&gt;&lt;P&gt; service-object udp destination eq isakmp &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object ip &lt;/P&gt;&lt;P&gt; service-object udp destination eq isakmp &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_3&lt;/P&gt;&lt;P&gt; service-object ip &lt;/P&gt;&lt;P&gt; service-object udp destination eq isakmp &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_4&lt;/P&gt;&lt;P&gt; service-object ip &lt;/P&gt;&lt;P&gt; service-object udp destination eq isakmp &lt;/P&gt;&lt;P&gt;access-list AllLocal standard permit host 216.113.190.154 &lt;/P&gt;&lt;P&gt;access-list AllLocal standard permit 10.12.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list AllLocal standard permit host 216.113.190.149 &lt;/P&gt;&lt;P&gt;access-list AllLocal standard permit 10.15.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list VPN_Client_Local_Lan standard permit any&lt;/P&gt;&lt;P&gt;access-list private_nat0_outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip 10.12.0.0 255.255.0.0 10.15.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip 10.10.0.0 255.255.0.0 10.15.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list global_mpc extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list nat_exempt extended permit ip 10.10.0.0 255.255.0.0 10.15.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nat_exempt extended permit ip 10.12.0.0 255.255.0.0 10.15.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nat_exempt extended permit ip any 10.12.12.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list nat_overload extended permit ip 10.10.0.0 255.255.0.0 any &lt;/P&gt;&lt;P&gt;access-list nat_overload extended permit ip 10.12.0.0 255.255.0.0 any &lt;/P&gt;&lt;P&gt;access-list capi extended permit tcp host 10.12.30.15 host 10.12.35.252 eq ssh &lt;/P&gt;&lt;P&gt;access-list capi extended permit tcp host 10.15.100.252 eq ssh host 10.12.30.15 &lt;/P&gt;&lt;P&gt;access-list capo extended permit tcp host 10.12.30.15 host 10.12.35.252 eq ssh &lt;/P&gt;&lt;P&gt;access-list capo extended permit tcp host 10.15.100.252 eq ssh host 10.12.30.15 &lt;/P&gt;&lt;P&gt;access-list capO extended permit ip host 66.77.96.250 host 66.191.64.126 &lt;/P&gt;&lt;P&gt;access-list capO extended permit ip host 66.191.64.126 host 66.77.96.250 &lt;/P&gt;&lt;P&gt;access-list global_mpc_1 extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 host 72.21.209.193 host 66.191.64.124 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_2 host 72.21.209.225 host 66.191.64.124 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp host 72.21.209.193 host 66.191.64.124 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp host 72.21.209.225 host 66.191.64.124 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp host 72.21.209.193 host 10.12.45.254 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp host 72.21.209.225 host 10.12.45.254 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_3 host 72.21.209.193 host 10.12.45.254 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_4 host 72.21.209.225 host 10.12.45.254 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq ssh &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out_1 extended permit ip any object-group DM_INLINE_NETWORK_2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tcp-map AllowProbes&lt;/P&gt;&lt;P&gt;&amp;nbsp; reserved-bits clear&lt;/P&gt;&lt;P&gt;&amp;nbsp; tcp-options range 76 78 allow&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 512&lt;/P&gt;&lt;P&gt;logging trap informational&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging mail debugging&lt;/P&gt;&lt;P&gt;logging facility 23&lt;/P&gt;&lt;P&gt;logging host inside 10.15.0.249&lt;/P&gt;&lt;P&gt;no logging message 106015&lt;/P&gt;&lt;P&gt;no logging message 106007&lt;/P&gt;&lt;P&gt;no logging message 313001&lt;/P&gt;&lt;P&gt;no logging message 313008&lt;/P&gt;&lt;P&gt;no logging message 106023&lt;/P&gt;&lt;P&gt;no logging message 305012&lt;/P&gt;&lt;P&gt;no logging message 305011&lt;/P&gt;&lt;P&gt;no logging message 710003&lt;/P&gt;&lt;P&gt;no logging message 106100&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 302018&lt;/P&gt;&lt;P&gt;no logging message 302017&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;no logging message 302021&lt;/P&gt;&lt;P&gt;no logging message 302020&lt;/P&gt;&lt;P&gt;flow-export destination inside 10.15.0.249 2055&lt;/P&gt;&lt;P&gt;flow-export template timeout-rate 10&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface HA_Failover_INT Ethernet0/2&lt;/P&gt;&lt;P&gt;failover key &lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover link HA_State_INT Ethernet0/3&lt;/P&gt;&lt;P&gt;failover interface ip HA_Failover_INT 10.12.36.2 255.255.255.0 standby 10.12.36.3&lt;/P&gt;&lt;P&gt;failover interface ip HA_State_INT 10.12.37.2 255.255.255.0 standby 10.12.37.3&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit host 10.15.0.249 echo-reply inside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit host 10.15.0.1 echo-reply inside&lt;/P&gt;&lt;P&gt;icmp permit any time-exceeded inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any time-exceeded outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-10.10.0.0 obj-10.10.0.0 destination static obj-10.15.0.0 obj-10.15.0.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-10.12.0.0 obj-10.12.0.0 destination static obj-10.15.0.0 obj-10.15.0.0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static any any destination static obj-10.12.12.0 obj-10.12.12.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-10.12.30.15 obj-66.191.64.115&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic obj-10.10.0.0 interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic obj-10.12.0.0 interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-10.12.45.254-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 66.191.64.124&lt;/P&gt;&lt;P&gt;access-group inside_access_out_1 out interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.191.64.113 1&lt;/P&gt;&lt;P&gt;route inside 10.12.0.0 255.255.0.0 10.12.35.1 1&lt;/P&gt;&lt;P&gt;route inside 10.20.0.0 255.255.0.0 10.12.45.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server DCRADIUS protocol radius&lt;/P&gt;&lt;P&gt; reactivation-mode depletion deadtime 1&lt;/P&gt;&lt;P&gt;aaa-server DCRADIUS (inside) host 10.12.34.11&lt;/P&gt;&lt;P&gt; retry-interval 3&lt;/P&gt;&lt;P&gt; key&lt;/P&gt;&lt;P&gt; authentication-port 1812&lt;/P&gt;&lt;P&gt; accounting-port 1813&lt;/P&gt;&lt;P&gt; radius-common-pw &lt;/P&gt;&lt;P&gt;aaa-server DCRADIUS (inside) host 10.12.34.12&lt;/P&gt;&lt;P&gt; retry-interval 3&lt;/P&gt;&lt;P&gt; key &lt;/P&gt;&lt;P&gt; authentication-port 1812&lt;/P&gt;&lt;P&gt; accounting-port 1813&lt;/P&gt;&lt;P&gt; radius-common-pw &lt;/P&gt;&lt;P&gt;aaa authentication ssh console DCRADIUS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console DCRADIUS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console DCRADIUS LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 10.12.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set Secure esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map Public_map 9 match address outside_cryptomap&lt;/P&gt;&lt;P&gt;crypto map Public_map 9 set pfs &lt;/P&gt;&lt;P&gt;crypto map Public_map 9 set peer 66.77.96.250 &lt;/P&gt;&lt;P&gt;crypto map Public_map 9 set ikev1 transform-set Secure&lt;/P&gt;&lt;P&gt;crypto map Public_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map Public_map interface outside&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;crypto ikev1 enable inside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 20&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 15&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun duration 3600&lt;/P&gt;&lt;P&gt;threat-detection statistics host number-of-rate 3&lt;/P&gt;&lt;P&gt;threat-detection statistics port number-of-rate 3&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol number-of-rate 3&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 10.12.34.11 source inside prefer&lt;/P&gt;&lt;P&gt;ntp server 10.12.34.12 source inside&lt;/P&gt;&lt;P&gt;tftp-server inside 10.12.30.19 asdm-635.bin&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-dart-win-2.5.0217-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match access-list global_mpc_1&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map Riverbed&lt;/P&gt;&lt;P&gt; match access-list global_mpc&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt; class Riverbed&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options AllowProbes&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; flow-export event-type all destination 10.15.0.249&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;smtp-server 10.15.20.84&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;hpm topN enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 19:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733066#M531839</guid>
      <dc:creator>brad.gocken</dc:creator>
      <dc:date>2011-09-02T19:04:16Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733067#M531840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enabling NAT-T should not affect the VPN tunnels that are already up. Make sure it is enabled at both the VPN end points. Here is a guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://secret-epedemiology-statistic.org.ua/1587052091/ch15lev1sec3.html#ch15lev2sec13"&gt;http://secret-epedemiology-statistic.org.ua/1587052091/ch15lev1sec3.html#ch15lev2sec13&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have more queries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Sep 2011 11:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733067#M531840</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-09-03T11:30:57Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733068#M531841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled it on the ASA5510 and from what I can tell and have read its enabled by default on the 2801 as its running a IOS later than 12.2(13)T or later. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After making the change I'm still seeing the same regular translation creation failed for protocol 50 src inside:10.12.45.254 dst outside:72.21.209.225 messages in my syslogs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Brad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Sep 2011 14:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733068#M531841</guid>
      <dc:creator>brad.gocken</dc:creator>
      <dc:date>2011-09-06T14:07:23Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733069#M531842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brad, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Who is 10.12.45.254 and who is 72.21.209.225? Clearly there are some ESP packets passing through the ASA between these two addresses, this is why you are getting the drops. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mention BGP and VPN... so I am kind of confused. What type of VPN is it? Which are the IP addresses involved? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I have this info, I think I will be able to provide you a better explanation of what is going on. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Sep 2011 19:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733069#M531842</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-06T19:10:33Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733070#M531843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have figured out what the hang up is. It appears that Amazon VPC doesn't support a customer Gatway device setup behind a NAT as they don't support NAT-T.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have moved the ISR outside of our firewall and gave it a public IP on a outside interface. Once I did that the BGP peering came up and the Tunnel was established. I'm now passing traffic through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you help in this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Brad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Sep 2011 20:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733070#M531843</guid>
      <dc:creator>brad.gocken</dc:creator>
      <dc:date>2011-09-06T20:04:27Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733071#M531844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.12.45.254 is the inside interface of our 2801 and the 72.21.209.225 is the Gateway device on Amazon's end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amazon's VPC setup requires BGP peering and creates a IPSEC tunnel for the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After doing much troubleshooting and digging I discovered that Amazon doesn't allow the customer gateway device ( in our case the 2801) to sit behind a NAT. I had to create a public interface on the 2801 and bypassed the ASA and the peering and tunnel came up and I'm now passing traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your input in this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Brad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Sep 2011 20:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733071#M531844</guid>
      <dc:creator>brad.gocken</dc:creator>
      <dc:date>2011-09-06T20:08:43Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733072#M531845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brad, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That was the other option, if the gateway does not support Nat traversal, the only option you had is to create a 1 to 1 translation and permit ESP towards the public IP of the inside device that is going to participate into the VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad that everything worked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Sep 2011 21:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733072#M531845</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-06T21:15:13Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733073#M531846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear that it works now!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2011 06:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733073#M531846</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-09-07T06:40:57Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733074#M531847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this the right thing to do? Isnt it a faulty configuration and hence you neede to do this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Dec 2011 06:04:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733074#M531847</guid>
      <dc:creator>jyothydas</dc:creator>
      <dc:date>2011-12-06T06:04:03Z</dc:date>
    </item>
    <item>
      <title>regular translation creation failed for protocol 50 src inside:</title>
      <link>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733075#M531848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope, Not really. Is just a matter of understanding how IPsec tunnels work across NAT devices. I mean, if you are running&amp;nbsp; PAT (port address translation) thats where the problem kicks in. Since GRE AH and ESP does not have ports, you cannot create a translation for them. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What NAT-Traversal do, is just to put a UDP header with port 4500 so it can create a proper translation on the NAT device (not only the ASA) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this makes sense. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Dec 2011 17:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/regular-translation-creation-failed-for-protocol-50-src-inside/m-p/1733075#M531848</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-06T17:09:36Z</dc:date>
    </item>
  </channel>
</rss>

