packet-tracer input OUTSIDE tcp 1.1.1.253 1234 200.200.200.10 80 Phase: 1 Type: UN-NAT Subtype: static Result: ALLOW Config: object network WEBSERVER nat (DMZ,OUTSIDE) static 200.200.200.10 Additional Information: NAT divert to egress interface DMZ Untranslate 200.200.200.10/80 to 172.16.1.253/80 Phase: 2 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group OUT-TO-DMZ in interface OUTSIDE access-list OUT-TO-DMZ extended permit tcp any host 172.16.1.253 eq www Additional Information: Phase: 3 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Phase: 4 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 5 Type: QOS Subtype: Result: ALLOW Config: Additional Information: Phase: 6 Type: FOVER Subtype: standby-update Result: ALLOW Config: Additional Information: Phase: 7 Type: NAT Subtype: rpf-check Result: ALLOW Config: object network WEBSERVER nat (DMZ,OUTSIDE) static 200.200.200.10 Additional Information: Phase: 8 Type: QOS Subtype: Result: ALLOW Config: Additional Information: Phase: 9 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Phase: 10 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 11 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 217, packet dispatched to next module Result: input-interface: OUTSIDE input-status: up input-line-status: up output-interface: DMZ output-status: up output-line-status: up Action: allow