No NAT configured on the Firewall. FW is behind the router (Cisco ISR 3925). The router is doing NAT.
I will test changing Sec lev to '0' tonight and monitor syslog output. I am not much into packet tracer.
None of the ports are being blocked by the ACLs.
FW has permit ip commands ('ip' should include sip's both tcp/udp connections right). The embryonic connections shouldn't be blocked. By stateful inspection property these connections should be included in the return traffic, or do I need to allow them on the outside incoming ACL?
As I have included 'inspect sip' in the global policy all related connections should be allowed.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...