<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can't point a public IP to my Internal server IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347255#M1032166</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3 things to rule out the issue:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. take a packet-tracer output to verify if the NAT and access rule is in effect:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 3344&amp;nbsp;&lt;SPAN&gt;222.222.222.228&amp;nbsp;80 detail&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. take a packet-capture on outside interface:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;capture capo interface outside match tcp any host&amp;nbsp;222.222.222.228&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;show cap capo&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Are you able to access the website just by the ip address and not name. If not, then the routing of the ip address is a concern for which ISP might be able to help.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please attach syslogs apart from above outputs, we can analyze them.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Mar 2018 04:25:16 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2018-03-13T04:25:16Z</dc:date>
    <item>
      <title>Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347239#M1032164</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I am Junior network admin and I am tasked to configure our office ASA 5506-X to so that one of the IP amongst our public IP range points to our webserver internal IP then which would allow users to access the website on the outside world. The problem is the following configuration(I will post below)&amp;nbsp;worked before and when we switched to a new ISP therefore switching a new public IP block, and changing the public IP representing the website on the outside world, the webpage times out and nothing comes up. Locally, we can access the webserver adding port 8080 to it: &lt;A href="http://10.10.1.30:8080" target="_blank"&gt;http://10.10.1.30:8080&lt;/A&gt;, but nothing is displayed on the outside network. Note that when we remove the :8080 just typing the following locally it doesn't go through either; &lt;A href="http://10.10.1.30" target="_blank"&gt;http://10.10.1.30&lt;/A&gt;. TIMES OUT...&lt;/P&gt;
&lt;P&gt;note the old public IP was 111.111.222.226, 255.255.255.224&amp;nbsp;new public IP selected within the IP block is 222.222.222.228 255.255.255.224&amp;nbsp;internal webserver IP 10.10.1.30&lt;/P&gt;
&lt;P&gt;Previous config that worked with old public IP pointing to the local webserver box and IP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;/P&gt;
&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network webserver-external-ip&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 111.111.222.226&lt;/P&gt;
&lt;P&gt;object network webserver-internal-ip&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 10.10.1.30&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network internal-subnet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;subnet 10.10.1.30 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group network company-HQ&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network-object 111.111.222.224 255.255.255.224&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list outside-in remark Allow traffic from public IP to companysite.com&lt;/P&gt;
&lt;P&gt;access-list outside-in extended permit tcp any object webserver-internal-ip eq www&lt;/P&gt;
&lt;P&gt;access-list outside-in remark Allow traffic from public IP to companysite.com&lt;/P&gt;
&lt;P&gt;access-list outside-in extended permit tcp any object webserver-internal-ip eq https&lt;/P&gt;
&lt;P&gt;access-list outside-in remark Test ICMP (ping) from inside to outside&lt;/P&gt;
&lt;P&gt;access-list outside-in extended deny ip any any&lt;/P&gt;
&lt;P&gt;access-list inside-in extended permit ip any any&lt;/P&gt;
&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit any&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;nat (inside,outside) source static internal-subnet&amp;nbsp; internal-subnet destination static xxx xxx no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;
&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; So, when we got a new IP block from the same ISP provider selected one usable IP within the block and replaced the host in this&amp;nbsp;Object network webserver-external-ip with the new ip as such:&lt;/P&gt;
&lt;P&gt;object-group network company-HQ&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network-object 222.222.222.226 255.255.255.224&lt;/P&gt;
&lt;P&gt;Object network webserver-external ip&lt;/P&gt;
&lt;P&gt;host&amp;nbsp; 222.222.222.228&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; after I've done that I thought things will keep work as before but no luck! the website is down. the new public IP was updated with the domain registrar as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; All help will be greatly appreciated please! I hope I explained clearly if not please let me know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347239#M1032164</guid>
      <dc:creator>newbie2018</dc:creator>
      <dc:date>2020-02-21T15:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347255#M1032166</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3 things to rule out the issue:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. take a packet-tracer output to verify if the NAT and access rule is in effect:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 3344&amp;nbsp;&lt;SPAN&gt;222.222.222.228&amp;nbsp;80 detail&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. take a packet-capture on outside interface:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;capture capo interface outside match tcp any host&amp;nbsp;222.222.222.228&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;show cap capo&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Are you able to access the website just by the ip address and not name. If not, then the routing of the ip address is a concern for which ISP might be able to help.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please attach syslogs apart from above outputs, we can analyze them.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 04:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347255#M1032166</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-03-13T04:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347570#M1032167</link>
      <description>&lt;P&gt;Hi Ajay,&lt;/P&gt;
&lt;P&gt;these are the outputs for the specified commands:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;asa# packet-tracer input outside tcp 4.2.2.2 3344&amp;nbsp;&lt;SPAN&gt;222.222.222.228&lt;/SPAN&gt; 80 detail&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop&amp;nbsp;&lt;SPAN&gt;222.222.222.228&lt;/SPAN&gt; using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;Result: DROP&lt;/FONT&gt;&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22b14c50, priority=111, domain=permit, &lt;FONT color="#FF6600"&gt;deny=true&lt;/FONT&gt;&lt;BR /&gt; hits=769, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;Action: drop&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) For the below command, nothing displays, nothing came up after running the command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;asa# capture capo interface outside match tcp any host&amp;nbsp;&lt;SPAN&gt;222.222.222.228&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;asa#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3)&lt;/P&gt;
&lt;P&gt;asa# show cap capo&lt;/P&gt;
&lt;P&gt;0 packet captured&lt;/P&gt;
&lt;P&gt;0 packet shown&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4) I am not able to access the website either &lt;SPAN&gt;by the ip address nor by name. I will contact the ISP and ask them about the routing of that specific IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;From the first command you advised to run, i noticed that there is a drop. and it looks like something is being blocked. I am not sure what.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Type: ACCESS-LIST&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Subtype:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Result: DROP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Implicit Rule&lt;/FONT&gt;&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fed22b14c50, priority=111, domain=permit, &lt;FONT color="#FF6600"&gt;deny=true&lt;/FONT&gt;&lt;BR /&gt;hits=769, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Action: drop&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not sure how to interprete this in depth.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your quick response and help.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;To add to the above findings. I initiated another capture... and i have the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;asa# show cap capo&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;10:19:37.360516 4.2.2.2.3344 &amp;gt; 222.222.222.228.80: S 376539812:376539812(0) win 8192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt; 2: 10:21:48.221485 4.2.2.2.3344 &amp;gt; 222.222.222.228.80: S 1503435714:1503435714(0) win 8192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt; 3: 10:21:57.814548 4.2.2.2.3344 &amp;gt; 222.222.222.228.80: S 1603185936:1603185936(0) win 8192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt; 4: 10:23:17.618803 4.2.2.2.3344 &amp;gt; 222.222.222.228.80: S 2107421198:2107421198(0) win 8192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt; 5: 10:34:28.315123 4.2.2.2.3344 &amp;gt; 222.222.222.228.80: S 1696172604:1696172604(0) win 8192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt; 6: 10:35:09.930554 4.2.2.2.3344 &amp;gt; 222.222.222.228.80: S 443932954:443932954(0) win 8192&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF6600"&gt; 7: 10:36:39.636655 4.2.2.2.3344 &amp;gt; 222.222.222.228.80: S 1041436200:1041436200(0) win 8192&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 14:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347570#M1032167</guid>
      <dc:creator>newbie2018</dc:creator>
      <dc:date>2018-03-13T14:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347649#M1032169</link>
      <description>&lt;P&gt;Strange, we don't see the NAT being hit for incoming traffic. Could you please share the NAT statement for the server in question. Also, lets make sure there is no other NAT higher in order related to the same public ip address or real ip address.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sh xlate&amp;nbsp; | in&amp;nbsp;&lt;SPAN&gt;10.10.1.30&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, can you try to add the NAT statement in manual NAT section.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 14:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347649#M1032169</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-03-13T14:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347675#M1032172</link>
      <description>&lt;P&gt;This is the NAT for the server:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;object network webserver-internal-ip&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;nat (inside,outside) static webserver-external-ip service tcp www www&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This NAT is no longer in the ASA config and everytime i add it then save the config, and do a sh run, it's still not within the config table.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure why!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I realized that there is another NAT than could be the problem. when i try to remove that it says the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-asa(config)# object network webserver-external-ip&lt;BR /&gt;-asa(config-network-object)# &lt;FONT color="#FF0000"&gt;no nat (inside,outside) static webserver-internal-ip service tcp www 8080&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;ERROR: NAT configuration not found for object webserver-external-ip&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The show xlate for the internal server IP:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;asa# show xlate | in 10.10.1.30&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;TCP PAT from inside:222.222.222.228 80-80 to outside:10.10.1.30 8080-8080&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is strange because it is considering the public IP as the inside IP and the local server IP the outside IP..&lt;/P&gt;
&lt;P&gt;I think the above NAT is what is causing the show xlate | in 10.10.1.30 to display the TCP PAT above...&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 15:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347675#M1032172</guid>
      <dc:creator>newbie2018</dc:creator>
      <dc:date>2018-03-13T15:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347727#M1032174</link>
      <description>&lt;P&gt;Manual NAT:&lt;BR /&gt;&lt;BR /&gt;show nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static internal-network&amp;nbsp;destination static Mount_Pearl Mount_Pearl no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static webserver-external-ip webserver-internal-ip service tcp www 8080&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt; translate_hits = 42769, untranslate_hits = 50&lt;BR /&gt;&lt;BR /&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (visitors) to (outside) source dynamic any interface&lt;BR /&gt; translate_hits = 4395535, untranslate_hits = 28531&lt;BR /&gt;2 (inside) to (outside) source dynamic any interface&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;.... I am still trying to rearrange the NAT policies...&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 17:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347727#M1032174</guid>
      <dc:creator>newbie2018</dc:creator>
      <dc:date>2018-03-13T17:26:03Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347792#M1032176</link>
      <description>&lt;P&gt;I though i would post the following so you guys can review it:&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp; &amp;nbsp; show packet-tracer....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed23a082f0, priority=13, domain=capture, deny=false&lt;BR /&gt; hits=9313059, user_data=0x7fed23a31f00, cs_id=0x0, l3_type=0x0&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22b11860, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=140382464, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network webserver-internal-ip&lt;BR /&gt; nat (inside,outside) static webserver-external-ip service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 222.222.222.228/80 to 10.10.1.30/80&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside-in in interface outside&lt;BR /&gt;access-list outside-in extended permit tcp any object webserver-internal-ip eq www&lt;BR /&gt;access-list outside-in remark Allow traffic from public IP to companysite.com website&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22be9ad0, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=74, user_data=0x7fed1cd183c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=10.10.1.30, mask=255.255.255.255, port=80, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed220a38a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=2499493, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22b19d20, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=5104929, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed232d5cb0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt; hits=50394, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network webserver-internal-ip&lt;BR /&gt; nat (inside,outside) static webserver-external-ip service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x7fed22cdade0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt; hits=32, user_data=0x7fed2331bc10, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=10.10.1.30, mask=255.255.255.255, port=80, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=inside&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed220a38a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=2499495, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22b74560, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=708338, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 5139763, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed23a082f0, priority=13, domain=capture, deny=false&lt;BR /&gt; hits=9313059, user_data=0x7fed23a31f00, cs_id=0x0, l3_type=0x0&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22b11860, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=140382464, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network webserver-internal-ip&lt;BR /&gt; nat (inside,outside) static webserver-external-ip service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 222.222.222.228/80 to 10.10.1.30/80&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside-in in interface outside&lt;BR /&gt;access-list outside-in extended permit tcp any object webserver-internal-ip eq www&lt;BR /&gt;access-list outside-in remark Allow traffic from public IP to companysite.com website&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22be9ad0, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=74, user_data=0x7fed1cd183c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=10.10.1.30, mask=255.255.255.255, port=80, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed220a38a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=2499493, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22b19d20, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=5104929, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed232d5cb0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt; hits=50394, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network webserver-internal-ip&lt;BR /&gt; nat (inside,outside) static webserver-external-ip service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x7fed22cdade0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt; hits=32, user_data=0x7fed2331bc10, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=10.10.1.30, mask=255.255.255.255, port=80, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=inside&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed220a38a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=2499495, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fed22b74560, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=708338, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 5139763, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;UDP PAT from inside:10.10.1.126/8933 to outside:222.222.222.226/8933 flags ri idle 0:16:03 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.123/8933 to outside:222.222.222.226/15737 flags ri idle 0:20:57 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.211/38267 to outside:222.222.222.226/38267 flags ri idle 0:00:02 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.211/38219 to outside:222.222.222.226/38219 flags ri idle 0:01:41 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.203/34993 to outside:222.222.222.226/34993 flags ri idle 0:01:41 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.121/8933 to outside:222.222.222.226/12065 flags ri idle 0:02:44 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/53000 to outside:222.222.222.226/53000 flags ri idle 0:00:07 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52999 to outside:222.222.222.226/52999 flags ri idle 0:00:25 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52998 to outside:222.222.222.226/52998 flags ri idle 0:00:28 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52997 to outside:222.222.222.226/52997 flags ri idle 0:00:38 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52996 to outside:222.222.222.226/52996 flags ri idle 0:00:38 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52995 to outside:222.222.222.226/52995 flags ri idle 0:00:44 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52991 to outside:222.222.222.226/52991 flags ri idle 0:01:33 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52990 to outside:222.222.222.226/52990 flags ri idle 0:01:33 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52944 to outside:222.222.222.226/52944 flags ri idle 0:02:36 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52910 to outside:222.222.222.226/52910 flags ri idle 0:12:41 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52861 to outside:222.222.222.226/52861 flags ri idle 0:15:45 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52862 to outside:222.222.222.226/9374 flags ri idle 0:15:45 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.144/52842 to outside:222.222.222.226/61009 flags ri idle 0:44:15 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.143/8933 to outside:222.222.222.226/20467 flags ri idle 0:03:52 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.142/8933 to outside:222.222.222.226/6214 flags ri idle 0:17:51 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.129/8933 to outside:222.222.222.226/56286 flags ri idle 0:05:56 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.209/45408 to outside:222.222.222.226/45408 flags ri idle 0:01:20 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.209/33033 to outside:222.222.222.226/33033 flags ri idle 0:01:29 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.128/8933 to outside:222.222.222.226/39331 flags ri idle 0:20:49 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.130/8933 to outside:222.222.222.226/1390 flags ri idle 0:14:05 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.210/47085 to outside:222.222.222.226/47085 flags ri idle 0:00:55 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.124/8933 to outside:222.222.222.226/30801 flags ri idle 0:19:49 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.125/8933 to outside:222.222.222.226/63054 flags ri idle 0:19:17 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.186/57478 to outside:222.222.222.226/57478 flags ri idle 0:27:02 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.186/57403 to outside:222.222.222.226/57403 flags ri idle 0:35:59 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:10.10.1.186/57342 to outside:222.222.222.226/57342 flags ri idle 0:41:28 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:10.10.1.186/62441 to outside:222.222.222.226/62441 flags ri idle 0:47:09 timeout 0:00:30&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) ASA# show caputre capo&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 17:20:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3347792#M1032176</guid>
      <dc:creator>newbie2018</dc:creator>
      <dc:date>2018-03-13T17:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3348115#M1032178</link>
      <description>&lt;P&gt;The last packet-tracer output looks good. Is it still not working?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, you mentioned that port 80 does not work for inside either. Could you try the config of NAT on port80 on public ip address and port 8080 for real server and try.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;AJ&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 04:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3348115#M1032178</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-03-14T04:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3349160#M1032180</link>
      <description>Hi Ajay,&lt;BR /&gt;I've tried changing NAT statements/adding others, still no luck. I'am not sure where else to look for answers. Can you provide a sample config on how you would configure NAT on port 80 on public IP and port 8080 for real server? &lt;BR /&gt;&lt;BR /&gt;Thank you much for your assistance.</description>
      <pubDate>Thu, 15 Mar 2018 13:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3349160#M1032180</guid>
      <dc:creator>newbie2018</dc:creator>
      <dc:date>2018-03-15T13:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3349433#M1032181</link>
      <description>&lt;P&gt;I figured it out!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue was the web server box itself.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am up and running.&lt;/P&gt;
&lt;P&gt;Thanks for your feedback Ajay!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 18:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3349433#M1032181</guid>
      <dc:creator>newbie2018</dc:creator>
      <dc:date>2018-03-15T18:49:42Z</dc:date>
    </item>
    <item>
      <title>Re: Can't point a public IP to my Internal server IP</title>
      <link>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3350361#M1032182</link>
      <description>&lt;P&gt;Thats Great. Happy to help!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please rate/mark answers as solution if it helped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Sun, 18 Mar 2018 05:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-point-a-public-ip-to-my-internal-server-ip/m-p/3350361#M1032182</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-03-18T05:53:36Z</dc:date>
    </item>
  </channel>
</rss>

