Result of the command: "packet-tracer input outside tcp 192.168.29.222 443 192.168.29.34 443 detail" Phase: 1 Type: UN-NAT Subtype: static Result: ALLOW Config: object network inside-host-https nat (inside_1,outside) static interface service tcp https https Additional Information: NAT divert to egress interface inside_1 Untranslate 192.168.29.34/443 to 192.168.1.15/443 Phase: 2 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group outside-https in interface outside access-list outside-https extended permit tcp any object inside-host-https eq https Additional Information: Forward Flow based lookup yields rule: in id=0x7fca04548c40, priority=13, domain=permit, deny=false hits=102, user_data=0x7fc9fe91f680, cs_id=0x0, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=192.168.1.15, mask=255.255.255.255, port=443, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 3 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7fca04dced20, priority=0, domain=nat-per-session, deny=false hits=934, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=any Phase: 4 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7fca05a47780, priority=0, domain=inspect-ip-options, deny=true hits=1532, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 5 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group outside-https in interface outside access-list outside-https extended permit tcp any object inside-host-https eq https Additional Information: Forward Flow based lookup yields rule: in id=0x7fca04548c40, priority=13, domain=permit, deny=false hits=103, user_data=0x7fc9fe91f680, cs_id=0x0, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=192.168.1.15, mask=255.255.255.255, port=443, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 6 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7fca04dced20, priority=0, domain=nat-per-session, deny=false hits=935, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=any Phase: 7 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7fca05a47780, priority=0, domain=inspect-ip-options, deny=true hits=1533, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=outside, output_ifc=any Phase: 8 Type: NAT Subtype: rpf-check Result: ALLOW Config: object network inside-host-https nat (inside_1,outside) static interface service tcp https https Additional Information: Forward Flow based lookup yields rule: out id=0x7fca068b6140, priority=6, domain=nat-reverse, deny=false hits=52, user_data=0x7fca05d26770, cs_id=0x0, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=192.168.1.15, mask=255.255.255.255, port=443, tag=any, dscp=0x0 input_ifc=outside, output_ifc=inside_1 Phase: 9 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7fca04dced20, priority=0, domain=nat-per-session, deny=false hits=937, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=any Phase: 10 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7fca05cdde80, priority=0, domain=inspect-ip-options, deny=true hits=782, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=inside, output_ifc=any Phase: 11 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7fca04dced20, priority=0, domain=nat-per-session, deny=false hits=938, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=any Phase: 12 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7fca05a1f510, priority=0, domain=inspect-ip-options, deny=true hits=925, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=inside_1, output_ifc=any Phase: 13 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 1259, packet dispatched to next module Module information for forward flow ... snp_fp_tracer_drop snp_fp_inspect_ip_options snp_fp_tcp_normalizer snp_fp_translate snp_fp_adjacency snp_fp_fragment snp_ifc_stat Module information for reverse flow ... snp_fp_tracer_drop snp_fp_inspect_ip_options snp_fp_translate snp_fp_tcp_normalizer snp_fp_adjacency snp_fp_fragment snp_ifc_stat Result: input-interface: outside input-status: up input-line-status: up output-interface: inside_1 output-status: up output-line-status: up Action: allow