<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: firepower device manager NAT rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3895291#M921704</link>
    <description>&lt;P&gt;Make your NAT rule type manual NAT instead of AutoNAT. Make sure it is above the AutoNAT rules an ASA 5506 generally has for inside-outside.&lt;/P&gt;
&lt;P&gt;Since you are using the outside interface address make the translated address "interface" instead of the IP address of the interface.&lt;/P&gt;
&lt;P&gt;I just set it up using FDM on my lab ASA 5506 with FTD (using ssh instead of telnet as my test protocol).&lt;/P&gt;
&lt;P&gt;Here what the confirmed working config looks like in the GUI:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL Entry" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41461i6491A61339674544/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA 5506 ACL.PNG" alt="ACL Entry" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;ACL Entry&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT Rule" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41462i458780444C00916C/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA 5506 NAT.PNG" alt="NAT Rule" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;NAT Rule&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Object definition" style="width: 604px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41463i8A5F06E2B446FF4E/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA 5506 Object.PNG" alt="Object definition" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Object definition&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jul 2019 04:15:00 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-07-23T04:15:00Z</dc:date>
    <item>
      <title>firepower device manager NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3893457#M921700</link>
      <description>&lt;P&gt;I wanna configure&amp;nbsp; a static NAT rule , from outside network (internet)&amp;nbsp; to access&amp;nbsp; inside switch (intranet)&lt;/P&gt;&lt;P&gt;using telnet protocol .&amp;nbsp; pls see below my setting ,but NAT didn't work , kindly advise right setting .&lt;/P&gt;&lt;P&gt;inside switch IP : 192.168.101.211&lt;/P&gt;&lt;P&gt;firepower outside interface IP : 192.168.0.20&amp;nbsp;&lt;/P&gt;&lt;P&gt;allow telnet protocol&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FDM   NAT rule.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41236iEC8D174EE67754E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="FDM   NAT rule.jpg" alt="FDM   NAT rule.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3893457#M921700</guid>
      <dc:creator>GordonKao6335</dc:creator>
      <dc:date>2020-02-21T17:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: firepower device manager NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3894003#M921701</link>
      <description>&lt;P&gt;Make the NAT type static and source address "Any".&lt;/P&gt;
&lt;P&gt;Also add an associated ACL allowing the incoming traffic.&lt;/P&gt;
&lt;P&gt;I'm hoping this is only for lab/learning purpose - otherwise don't use telnet as it is insecure. Use ssh instead.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 03:15:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3894003#M921701</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-20T03:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: firepower device manager NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3894604#M921702</link>
      <description>&lt;P&gt;have done as you told me , but still no luck ,pls see my setting as attached ,&lt;/P&gt;&lt;P&gt;all I wanna is&amp;nbsp; outside hosts can make a telnet connection from outside to inside switch using telnet port 23 ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT rule&amp;nbsp; translate&amp;nbsp; Firepwer outside interface IP&amp;nbsp; 192.168.0.20&amp;nbsp; to&amp;nbsp; inside switch IP 192.168.101.211&amp;nbsp;&lt;/P&gt;&lt;P&gt;I choose " auto NAT " , type : static ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;firewall outside interface ip: 192.168.0.20&amp;nbsp;&lt;/P&gt;&lt;P&gt;firewall inside interface ip : 192.168.101.254&amp;nbsp;&lt;/P&gt;&lt;P&gt;switch vlan ip 192.168.101.211&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the&amp;nbsp; connection scenario&amp;nbsp; is :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;outside host : 192.168.0.4&amp;nbsp; --&amp;gt; FPR2110 outside interface (192.168.0.20 ) --&amp;gt; FPR2110 inside interface (192.168.101.254)--&amp;gt; inside switch 192.168.101.211&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 07:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3894604#M921702</guid>
      <dc:creator>GordonKao6335</dc:creator>
      <dc:date>2019-07-22T07:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: firepower device manager NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3894721#M921703</link>
      <description>&lt;P&gt;while deploy NAT rule via firepower 2110 device manager console , I got the following error message&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;pls&amp;nbsp; advise&amp;nbsp; how to resolve the outside interface overlaps issue .&amp;nbsp; tks .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;22 July, 2019 Deployment failed User(Admin) Trigger deployment&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ERROR: Address 140.110.141.117 overlaps with outside interface address.&lt;BR /&gt;ERROR: NAT Policy is not downloaded&lt;BR /&gt;&lt;BR /&gt;Config Error -- nat (inside,outside) static Switch_Public_IP service tcp 23 23&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 11:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3894721#M921703</guid>
      <dc:creator>GordonKao6335</dc:creator>
      <dc:date>2019-07-22T11:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: firepower device manager NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3895291#M921704</link>
      <description>&lt;P&gt;Make your NAT rule type manual NAT instead of AutoNAT. Make sure it is above the AutoNAT rules an ASA 5506 generally has for inside-outside.&lt;/P&gt;
&lt;P&gt;Since you are using the outside interface address make the translated address "interface" instead of the IP address of the interface.&lt;/P&gt;
&lt;P&gt;I just set it up using FDM on my lab ASA 5506 with FTD (using ssh instead of telnet as my test protocol).&lt;/P&gt;
&lt;P&gt;Here what the confirmed working config looks like in the GUI:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL Entry" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41461i6491A61339674544/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA 5506 ACL.PNG" alt="ACL Entry" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;ACL Entry&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT Rule" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41462i458780444C00916C/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA 5506 NAT.PNG" alt="NAT Rule" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;NAT Rule&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Object definition" style="width: 604px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/41463i8A5F06E2B446FF4E/image-size/large?v=v2&amp;amp;px=999" role="button" title="ASA 5506 Object.PNG" alt="Object definition" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Object definition&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2019 04:15:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-device-manager-nat-rule/m-p/3895291#M921704</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-23T04:15:00Z</dc:date>
    </item>
  </channel>
</rss>

