Hi everyone,
I'm setting up a Firepower (FDM on box) running version 7 as part of a lab environment to prepare for some network changes in our production environment to try to avoid getting stuck late during implementation.
I was trying to create a simple inbound NAT policy to allow access to an internal server behind a DMZ interface using a public static IP on the outside interface.
In my experience with SonicWall devices, the public IP is typically the original destination and the private IP is the translated destination. However, I came across a Cisco tutorial suggesting that the FTD configuration would reverse this logic, setting the internal IP as the original packet destination and the public IP as the translated destination.
I am a bit confused as to why Cisco FTD handles NAT in this way. Is there something I am not getting?