<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower PAT bug ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3818789#M982018</link>
    <description>&lt;P&gt;This is a dynamic unidirectional outbound Nat so there are no connections in the table inbound. Just many outbound that should allow traffic back in as per the state table, but I would argue only from ips that we have initiated connections with ?&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 13:29:51 GMT</pubDate>
    <dc:creator>rmathieson7</dc:creator>
    <dc:date>2019-03-13T13:29:51Z</dc:date>
    <item>
      <title>Firepower PAT bug ?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3804740#M982015</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I noticed that port scans had been querying all the internal hosts with bidirectional NATs defined which is obviously expected.&amp;nbsp; But I also noticed that odd internal hosts that shouldn't be routable were also in scope on occasion.&amp;nbsp; Further investigation shows that this is happening when the port scan targets our default internet breakout PAT address which is obviously a dynamic unidirectional PAT.&amp;nbsp; The packet I'm seeing is nothing out of the ordinary, just a syn with a sequence number of 0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I use packet tracer to try to replicate the traffic it correctly drops it as there isn't anything in the state table to match.&amp;nbsp; Has anyone else seen this before ?&amp;nbsp; I certainly don't think it's expected behavior but can't seem to find any mention of a bug that would explain what I'm seeing.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3804740#M982015</guid>
      <dc:creator>rmathieson7</dc:creator>
      <dc:date>2019-03-12T14:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower PAT bug ?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3807663#M982016</link>
      <description>&lt;P&gt;I did a packet trace the other day when I noticed this and have just done another and as expected a random IP with random TCP port gets dropped with the reason '(nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I've had time this morning to repeat the test by checking the xlate table first and select a port number already in there against the public PAT IP then it does in fact un-nat and try to route to the corresponding inside host.&amp;nbsp; The traffic is then blocked during the Snort phase due to hitting the deny rule at the bottom or our ruleset.&amp;nbsp;&amp;nbsp; I don't see any mention of the state table though, my expectation would be that it would lookup against the state table and if the IP / port number matched then it would be allowed.&amp;nbsp; The fact that it seems to be getting as far as the ruleset from a completely different IP is again a concern.&lt;BR /&gt;&lt;BR /&gt;Anyone think this is expected / unexpected ?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2019 14:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3807663#M982016</guid>
      <dc:creator>rmathieson7</dc:creator>
      <dc:date>2019-02-22T14:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower PAT bug ?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3814188#M982017</link>
      <description>&lt;P&gt;If there is an existing xlate entry for the source address a.b.c.d created for an outbound session (from inside to ouside) and there is another inbound connection (outside to inside) from a different source to the mapped IP address and port of a.b.c.d, then that existing xlate entry will be used for a translation, no matter what the new source IP address is. For this new connection UN-NAT will be performed using existing xlate and then access-list check will be performed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT is not a security technology and is not enforcing any security checks.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 12:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3814188#M982017</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-05T12:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower PAT bug ?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3818789#M982018</link>
      <description>&lt;P&gt;This is a dynamic unidirectional outbound Nat so there are no connections in the table inbound. Just many outbound that should allow traffic back in as per the state table, but I would argue only from ips that we have initiated connections with ?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 13:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3818789#M982018</guid>
      <dc:creator>rmathieson7</dc:creator>
      <dc:date>2019-03-13T13:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower PAT bug ?</title>
      <link>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3828236#M982019</link>
      <description>&lt;P&gt;Thanks, I have since tested this on a lab on an ASA and it behaves in exactly the same way.&amp;nbsp; Happy to accept this as a solution, the more I thought about it the more sense it made and also sounded familiar.&amp;nbsp; Thanks again for the explanation.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 16:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-pat-bug/m-p/3828236#M982019</guid>
      <dc:creator>rmathieson7</dc:creator>
      <dc:date>2019-03-28T16:35:07Z</dc:date>
    </item>
  </channel>
</rss>

