<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Portmap translation failed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338483#M858681</link>
    <description>&lt;P&gt;I have a client that has an ASA that has routes to remote locations that point to another firewall on the LAN. So the clients default to the ASA and then the ASA should route traffic for the remote locations to the other firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This creates the hair pinning issue which is remedied by the 'same-security-traffic permit intra-interface' command. &lt;/P&gt;&lt;P&gt;However the traffic is getting no where and the logs keep giving the portmap translation creation failed message. I have tried a no nat on the inside interface but that does nothing. Does anyone know how to fix this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.40 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Flow Internet Connection&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN Connection&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq 65100 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq ftp-data &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq 800 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered warnings&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.35 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 65100 192.168.1.35 65100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp-data 192.168.1.9 ftp-data netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp 192.168.1.9 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.1.34 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route inside 10.10.3.0 255.255.255.0 10.10.1.4 1&lt;/P&gt;&lt;P&gt;route inside 10.10.4.0 255.255.255.0 10.10.1.4 1&lt;/P&gt;&lt;P&gt;route inside 10.10.7.0 255.255.255.0 10.10.1.4 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 10.10.1.6 1&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 10.10.1.6 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 15:54:51 GMT</pubDate>
    <dc:creator>kwillacey</dc:creator>
    <dc:date>2019-03-11T15:54:51Z</dc:date>
    <item>
      <title>Portmap translation failed</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338483#M858681</link>
      <description>&lt;P&gt;I have a client that has an ASA that has routes to remote locations that point to another firewall on the LAN. So the clients default to the ASA and then the ASA should route traffic for the remote locations to the other firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This creates the hair pinning issue which is remedied by the 'same-security-traffic permit intra-interface' command. &lt;/P&gt;&lt;P&gt;However the traffic is getting no where and the logs keep giving the portmap translation creation failed message. I have tried a no nat on the inside interface but that does nothing. Does anyone know how to fix this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.40 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Flow Internet Connection&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN Connection&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq 65100 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq ftp-data &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host x.x.x.x eq 800 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered warnings&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.35 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 65100 192.168.1.35 65100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp-data 192.168.1.9 ftp-data netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp 192.168.1.9 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.1.34 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route inside 10.10.3.0 255.255.255.0 10.10.1.4 1&lt;/P&gt;&lt;P&gt;route inside 10.10.4.0 255.255.255.0 10.10.1.4 1&lt;/P&gt;&lt;P&gt;route inside 10.10.7.0 255.255.255.0 10.10.1.4 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 10.10.1.6 1&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 10.10.1.6 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338483#M858681</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2019-03-11T15:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap translation failed</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338484#M858682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I searched the forum before I posted and I'm still searching to find an answer but I get the feeling that there is no way to fix this problem, no matter which nat rules are used. I'm gonna be red faced at the client tomorrow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there a fix???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jul 2009 17:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338484#M858682</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-14T17:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap translation failed</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338485#M858683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pasted the wrong routes &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 10.10.3.0 255.255.255.0 192.168.1.10 1&lt;/P&gt;&lt;P&gt;route inside 10.10.4.0 255.255.255.0 192.168.1.10 1&lt;/P&gt;&lt;P&gt;route inside 10.10.7.0 255.255.255.0 192.168.1.10 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.10 1&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 192.168.1.10 1 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jul 2009 19:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338485#M858683</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-14T19:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap translation failed</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338486#M858684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally got the following commands to fix the problem, i am no ASA expert but I think it had something to do with return traffic going directly to the host instead of through the ASA so when the client replies the ASA was unable to find a translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.10.3.0 10.10.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.10.4.0 10.10.4.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.10.7.0 10.10.7.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps someone in the future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jul 2009 21:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338486#M858684</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-14T21:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap translation failed</title>
      <link>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338487#M858685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry guys spoke too soon traffic only works in one direction and I got the following error and it makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-6-106015: Deny TCP (no connection) from 10.10.1.19/3389 to 10.10.3.2/49159 flags SYN ACK  on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a client from the head office initiates a connection to a remote location the traffic has to go through the firewall and based on the configuration the firewall would send the request using it's IP address so the return traffic would have to be sent back to the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However if the traffic is initiated from the remote location (which it should be), it will go directly to the host because the router is on the same LAN as the host and would not need to send that traffic to the firewall so when the hosts responds and sends the traffic to the firewall it will deny it because it had no prior connection built. This is the default behaviour of the firewall and as far as I am concerned there is no way around it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A layer 3 switch or making the router the gateway or connecting the router to the ASA on a different VLAN are the only ways to alleviate this problem in my opinion. Any ASA expert care to weigh in?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jul 2009 16:48:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-translation-failed/m-p/1338487#M858685</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-16T16:48:03Z</dc:date>
    </item>
  </channel>
</rss>

