<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 8.2 global and static nat issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220588#M1064919</link>
    <description>&lt;P&gt;Hi Scott,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Packet tracer is not properly written.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I&amp;nbsp; would first recommend you to write the nats from inside to outside.... just to be more organized.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so do&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 32400 159.118.X.X 32400 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 8989 159.118.X.X 8989 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 8080 159.118.X.X 8080 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 5050 159.118.X.X 5050 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) udp 10.10.X.X 22 159.118.X.X 20122 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x&amp;nbsp; 32400 10.10.x.x 32400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x 8989 10.10.x.x 8989&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x 8080 10.10.x.x 8080&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x 5050 10.10.x.x 5050&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Then run the following packet tracer&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input outside tcp 11.10.9.8 1025 159.118.x.x 32400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please provide us the output as we might need to run captures depending on the result.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Julio Carvajal&lt;/P&gt;
&lt;P class="p1"&gt;Senior Network Security and Core Specialist&lt;/P&gt;
&lt;P class="p1"&gt;CCIE #42930, 2xCCNP, JNCIP-SEC&lt;/P&gt;</description>
    <pubDate>Wed, 22 Nov 2017 02:29:32 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2017-11-22T02:29:32Z</dc:date>
    <item>
      <title>ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220235#M1064903</link>
      <description>&lt;P&gt;Im setting up a home lab and having a real time with natting. My global statement seems to override my static statements causing a drop in my inbound traffic to a plex server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Right now in the below outputs i kinda have the static statements reversed i think just because i tried to place them on the outside interface to separate them from the global statement but im pretty sure its all wrong. Any and all advise is very much appreciated.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are some show and packet trace inputs, a couple of notes I currently have a permit ip any any for troubleshooting reasons and I included a couple of packet trace inputs, one that has my publick ip as the source and one that just has any public IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any any&lt;BR /&gt;access-list OUTSIDE_access_in extended permit udp any host 10.10.X.X eq 20122 log&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 10.10.X.X eq 5050 log&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 10.10.X.X eq 8989 log&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 10.10.X.X eq 8080 log&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 10.10.X.X eq 32400 log&lt;BR /&gt;access-list OUTSIDE_access_in extended deny ip any any&lt;BR /&gt;access-list LAB_access_in extended permit ip any any&lt;BR /&gt;access-list LAB_access_in extended deny ip any any&lt;BR /&gt;access-list WIRELESS_access_in extended permit ip any any&lt;BR /&gt;access-list WIRELESS_access_in extended deny ip any any&lt;BR /&gt;access-list plex_access_in extended permit ip any any&lt;BR /&gt;access-list plex_access_in extended deny ip any any&lt;BR /&gt;access-list OUTSIDE_acess_in extended permit udp any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu WIRELESS 1500&lt;BR /&gt;mtu LAB 1500&lt;BR /&gt;mtu Plex 1500&lt;BR /&gt;ip local pool vpn_users 10.10.X.2-10.10.X.254 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Outside) 10 interface&lt;BR /&gt;nat (Plex) 10 10.10.X.0 255.255.255.0&lt;BR /&gt;static (Outside,Plex) tcp 10.10.X.X 32400 159.118.X.X 32400 netmask 255.255.255.255&lt;BR /&gt;static (Outside,Plex) tcp 10.10.X.X 8989 159.118.X.X 8989 netmask 255.255.255.255&lt;BR /&gt;static (Outside,Plex) tcp 10.10.X.X 8080 159.118.X.X 8080 netmask 255.255.255.255&lt;BR /&gt;static (Outside,Plex) tcp 10.10.X.X 5050 159.118.X.X 5050 netmask 255.255.255.255&lt;BR /&gt;static (Outside,Plex) udp 10.10.X.X 22 159.118.X.X 20122 netmask 255.255.255.255&lt;BR /&gt;access-group OUTSIDE_access_in in interface Outside&lt;BR /&gt;access-group WIRELESS_access_in in interface WIRELESS&lt;BR /&gt;access-group LAB_access_in in interface LAB&lt;BR /&gt;access-group plex_access_in in interface Plex&lt;BR /&gt;timeout xlate 3:00:00&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT policies on Interface Outside:&lt;BR /&gt; match tcp Outside host 159.118.X.X eq 32400 Plex any&lt;BR /&gt; static translation to 10.10.X.X/32400&lt;BR /&gt; translate_hits = 0, untranslate_hits = 17&lt;BR /&gt; match tcp Outside host 159.118.X.X eq 8989 Plex any&lt;BR /&gt; static translation to 10.10.X.X/8989&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt; match tcp Outside host 159.118.X.X eq 8080 Plex any&lt;BR /&gt; static translation to 10.10.X.X/8080&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt; match tcp Outside host 159.118.X.X eq 5050 Plex any&lt;BR /&gt; static translation to 10.10.X.X/5050&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt; match udp Outside host 159.118.X.X eq 20122 Plex any&lt;BR /&gt; static translation to 10.10.X.X/22&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;NAT policies on Interface Plex:&lt;BR /&gt; match ip Plex 10.10.X.X255.255.255.0 Outside any&lt;BR /&gt; dynamic translation to pool 10 (159.118.X.X [Interface PAT])&lt;BR /&gt; translate_hits = 538, untranslate_hits = 43&lt;BR /&gt; match ip Plex 10.10.X.X 255.255.255.0 WIRELESS any&lt;BR /&gt; dynamic translation to pool 10 (No matching global)&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt; match ip Plex 10.10.X.X 255.255.255.0 LAB any&lt;BR /&gt; dynamic translation to pool 10 (No matching global)&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt; match ip Plex 10.10.X.X 255.255.255.0 Plex any&lt;BR /&gt; dynamic translation to pool 10 (No matching global)&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Scott-ASA5510-EDGE(config)# packet-tracer input outside udp 159.118.X.X 20122 10.1$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab90ae00, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=11924721, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 10.10.X.X 255.255.255.0 Plex&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab928108, priority=500, domain=permit, deny=true&lt;BR /&gt; hits=18, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=159.118.X.X, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Plex&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Scott-ASA5510-EDGE(config)# packet-tracer input outside udp 1.1.1.1 20122 10.1$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab90ae00, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=11946670, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 10.10.X.X 255.255.255.0 Plex&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_access_in in interface Outside&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xacbc0a38, priority=12, domain=permit, deny=false&lt;BR /&gt; hits=3838, user_data=0xa8b3fb80, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab90d538, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=40865, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (Plex) 10 10.10.X.X 255.255.255.0&lt;BR /&gt; match ip Plex 10.10.X.X 255.255.255.0 Outside any&lt;BR /&gt; dynamic translation to pool 10 (159.118.X.X [Interface PAT])&lt;BR /&gt; translate_hits = 701, untranslate_hits = 48&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xacb91d98, priority=1, domain=nat-reverse, deny=false&lt;BR /&gt; hits=49, user_data=0xaba3dd70, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=10.10.30.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Plex&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:48:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220235#M1064903</guid>
      <dc:creator>scott@m</dc:creator>
      <dc:date>2020-02-21T14:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220373#M1064908</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Looks like you are using local address on the access list, in 8.2 you need to use the global ip address.&lt;BR /&gt;This changed in after 8.3 release of ASA nat.&lt;BR /&gt;&lt;BR /&gt;br, Micke</description>
      <pubDate>Tue, 21 Nov 2017 19:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220373#M1064908</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2017-11-21T19:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220490#M1064910</link>
      <description>&lt;P&gt;Can you give me an example of what you are referring to? The access list is set to allow IP any any, Global or internal.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2017 21:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220490#M1064910</guid>
      <dc:creator>scott@m</dc:creator>
      <dc:date>2017-11-21T21:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220497#M1064913</link>
      <description>Missed the first line, sorry about that.&lt;BR /&gt;I was referring to these:&lt;BR /&gt;access-list OUTSIDE_access_in extended permit udp any host 10.10.X.X eq 20122 log&lt;BR /&gt;10.10.x.x should be a 159.118.X.X address if it is access from internet.&lt;BR /&gt;&lt;BR /&gt;Trying to figure out, what the problem is.&lt;BR /&gt;&lt;BR /&gt;br, Micke</description>
      <pubDate>Tue, 21 Nov 2017 21:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220497#M1064913</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2017-11-21T21:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220522#M1064915</link>
      <description>Have you tried with real traffic, so it's not an issue with packet tracer?&lt;BR /&gt;Looks like you are using wrong destination ip on the packet tracer. "udp 1.1.1.1 20122 10.1$"&lt;BR /&gt;That should at least be 159.1$ at the end.&lt;BR /&gt;&lt;BR /&gt;br, Micke</description>
      <pubDate>Tue, 21 Nov 2017 22:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220522#M1064915</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2017-11-21T22:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220546#M1064917</link>
      <description>&lt;P&gt;yes, none of my outside to inside traffic is passing, hence the troubleshooting with packet tracer. Ive seen post with any public ip used and ive seen post with the outside interface ip used... i just included both.&lt;/P&gt;
&lt;P&gt;if you look at the PT you notice the rpf check is using the global nat rather than the static nat... I believe this is where the problem is i just dont know how to correct the behavior.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2017 23:44:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220546#M1064917</guid>
      <dc:creator>scott@m</dc:creator>
      <dc:date>2017-11-21T23:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220588#M1064919</link>
      <description>&lt;P&gt;Hi Scott,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Packet tracer is not properly written.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I&amp;nbsp; would first recommend you to write the nats from inside to outside.... just to be more organized.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so do&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 32400 159.118.X.X 32400 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 8989 159.118.X.X 8989 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 8080 159.118.X.X 8080 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) tcp 10.10.X.X 5050 159.118.X.X 5050 netmask 255.255.255.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no static (Outside,Plex) udp 10.10.X.X 22 159.118.X.X 20122 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x&amp;nbsp; 32400 10.10.x.x 32400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x 8989 10.10.x.x 8989&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x 8080 10.10.x.x 8080&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (Plex,Outside) tcp 159.118.x.x 5050 10.10.x.x 5050&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Then run the following packet tracer&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input outside tcp 11.10.9.8 1025 159.118.x.x 32400&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please provide us the output as we might need to run captures depending on the result.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Julio Carvajal&lt;/P&gt;
&lt;P class="p1"&gt;Senior Network Security and Core Specialist&lt;/P&gt;
&lt;P class="p1"&gt;CCIE #42930, 2xCCNP, JNCIP-SEC&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 02:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3220588#M1064919</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2017-11-22T02:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3221269#M1064921</link>
      <description>&lt;P&gt;thank you so much .. this worked like a champ!!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 21:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3221269#M1064921</guid>
      <dc:creator>scott@m</dc:creator>
      <dc:date>2017-11-22T21:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3221282#M1064923</link>
      <description>&lt;P&gt;Sweet!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Glad to know that I could help mate&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 21:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3221282#M1064923</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2017-11-22T21:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.2 global and static nat issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3222323#M1064925</link>
      <description>&lt;P&gt;I&amp;nbsp;hate to post in the same thread but its still a natting issue and same config.&lt;/P&gt;
&lt;P&gt;Ive enabled the other interfaces I need on the ASA but Im not getting traffic between the interfaces as its being dropped by natting restrictions and I need wireless to be able to access the Plex interface. same security level was enabled but its still hitting my global rules.&lt;/P&gt;
&lt;P&gt;configs and PT listed below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;global (Outside) 10 interface&lt;BR /&gt;nat (WIRELESS) 10 10.10.x.x 255.255.255.0&lt;BR /&gt;nat (LAB) 10 10.10.x.x 255.255.255.0&lt;BR /&gt;nat (Plex) 10 10.10.x.x 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Scott-ASA5510-EDGE(config)# packet-tracer input wireless tcp 10.10.x.x 1025 1$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 10.10.x.x 255.255.255.0 Plex&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group WIRELESS_access_in in interface WIRELESS&lt;BR /&gt;access-list WIRELESS_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xaba4cfc0, priority=12, domain=permit, deny=false&lt;BR /&gt; hits=29142, user_data=0xa8b3f800, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab96b848, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=29873, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (WIRELESS) 10 10.10.x.x 255.255.255.0&lt;BR /&gt; match ip WIRELESS 10.10.x.x 255.255.255.0 Plex any&lt;BR /&gt; dynamic translation to pool 10 (No matching global)&lt;BR /&gt; translate_hits = 2708, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xacb9cb08, priority=1, domain=nat, deny=false&lt;BR /&gt; hits=2704, user_data=0xacb9ca48, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=10.10.x.x, mask=255.255.255.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: WIRELESS&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Plex&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2017 03:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-2-global-and-static-nat-issue/m-p/3222323#M1064925</guid>
      <dc:creator>scott@m</dc:creator>
      <dc:date>2017-11-25T03:42:03Z</dc:date>
    </item>
  </channel>
</rss>

