<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Newbie Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413975#M951388</link>
    <description>&lt;P&gt;Do you have a screenshot of the updated rule? Also run the packet tracer again after you have changed the port to destination in the policy.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jul 2018 12:39:10 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2018-07-11T12:39:10Z</dc:date>
    <item>
      <title>Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413535#M951383</link>
      <description>&lt;P&gt;I recently purchased a 5506-X FTD firewall and am having difficulties enabling outside-inside traffic. I want to allow OpenVPN traffic (port 1194) . I opened port 1194 on the outside i/f as shown in the attached screen shot. I then tried a packet trace:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt; packet-tracer input outside udp 8.8.8.8 3344 76.14.82.204 1194&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 76.14.82.204 using egress ifc identity&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't understand why access control denies the connection, since I thought I enabled the correct port. Any help would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:58:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413535#M951383</guid>
      <dc:creator>MorrisJM</dc:creator>
      <dc:date>2020-02-21T15:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413544#M951385</link>
      <description>&lt;P&gt;OpenVPN should be under destination protocol, not source. If you are using&amp;nbsp;&lt;SPAN&gt;1194 as source port as well from the outside, then this would work. I don't think this is the case though as random ports would be used as source ports.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jul 2018 18:39:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413544#M951385</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-07-10T18:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413645#M951386</link>
      <description>Thanks for your reply. I tried OpenVPN as the destination port with source port ANY and I tried OpenVPN as both source and destination port. In both cases I got the same result as before.&lt;BR /&gt;</description>
      <pubDate>Tue, 10 Jul 2018 22:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413645#M951386</guid>
      <dc:creator>MorrisJM</dc:creator>
      <dc:date>2018-07-10T22:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413925#M951387</link>
      <description>&lt;P&gt;How does your NAT look?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming that you have a private IP address on the inside network, then you have to translate your OpenVPN address.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once the NAT is correctly implemented, you have to use&amp;nbsp;the destination port as previously mentioned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 10:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413925#M951387</guid>
      <dc:creator>Jesper Erbs</dc:creator>
      <dc:date>2018-07-11T10:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413975#M951388</link>
      <description>&lt;P&gt;Do you have a screenshot of the updated rule? Also run the packet tracer again after you have changed the port to destination in the policy.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 12:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3413975#M951388</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2018-07-11T12:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414075#M951389</link>
      <description>&lt;P&gt;Thanks for your reply. The NAT configuration is attached.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 15:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414075#M951389</guid>
      <dc:creator>MorrisJM</dc:creator>
      <dc:date>2018-07-11T15:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414092#M951390</link>
      <description>&lt;P&gt;Thanks for your response. Attached in the screen shot for the updated rule.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 15:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414092#M951390</guid>
      <dc:creator>MorrisJM</dc:creator>
      <dc:date>2018-07-11T15:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414271#M951391</link>
      <description>&lt;P&gt;Try to reorder your NAT, so the static NAT is #1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 19:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414271#M951391</guid>
      <dc:creator>Jesper Erbs</dc:creator>
      <dc:date>2018-07-11T19:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414285#M951392</link>
      <description>&lt;P&gt;That solved the problem. Thanks very, very much!! Just so I understand: the problem was that when static rules are searched a match on either source or destination selects the rule? In my case, the inside1_2 rule was chosen because it appeared earlier in the list?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 20:14:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414285#M951392</guid>
      <dc:creator>MorrisJM</dc:creator>
      <dc:date>2018-07-11T20:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414289#M951393</link>
      <description>&lt;P&gt;I meant when the manual rules are searched ...&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jul 2018 20:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414289#M951393</guid>
      <dc:creator>MorrisJM</dc:creator>
      <dc:date>2018-07-11T20:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: Newbie Question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414492#M951394</link>
      <description>&lt;P&gt;I am glad I could help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, the rules are&amp;nbsp;matched top-down, so your inside1_2 rule&amp;nbsp;took precedence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a couple of ways of configuring NAT, but the main rule to remember is, that they are matched top-down.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But if you need a little reading - Here is a link on NAT in FDM. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdm-nat.html#ID-2090-000000b5" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdm-nat.html#ID-2090-000000b5&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a good day.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 05:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/3414492#M951394</guid>
      <dc:creator>Jesper Erbs</dc:creator>
      <dc:date>2018-07-12T05:59:08Z</dc:date>
    </item>
  </channel>
</rss>

