<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound NAT issue with PBR on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3204579#M1065317</link>
    <description>&lt;P&gt;sanitized config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA Version 9.6(3)1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif inf_Data&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.1.254 255.255.255.0&lt;BR /&gt;&amp;nbsp;policy-route route-map ALT-GATEWAY&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;desc /30 with /29 routeable block&lt;BR /&gt;&amp;nbsp;nameif inf_ISPB&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 2.2.2.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;nameif inf_ISPA&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 1.1.1.2 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;object network host1&lt;BR /&gt;&amp;nbsp;host 10.1.1.20&lt;BR /&gt;object network net_ISPB-PublicBlock&lt;BR /&gt;&amp;nbsp;subnet 3.3.3.0 255.255.255.248&lt;BR /&gt;object network ip_ISPB-NAT&lt;BR /&gt;&amp;nbsp;host 3.3.3.1&lt;/P&gt;
&lt;P&gt;access-list acl_Firewall-ISPA extended permit icmp any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list acl_Firewall-ISPB extended permit icmp any any&lt;BR /&gt;access-list acl_Firewall-ISPB extended permit tcp any object host1 eq telnet&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list acl_ISPB-PBR extended permit ip object host1 any4&lt;BR /&gt;access-list acl_ISPB-PBR extended deny ip any4 any4&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;object network host1&lt;BR /&gt;&amp;nbsp;nat (inf_Data,any) static ip_ISPB-NAT&lt;BR /&gt;!&lt;BR /&gt;access-group acl_Firewall-ISPB in interface inf_ISPB&lt;BR /&gt;access-group acl_Firewall-ISPA in interface inf_ISPA&lt;BR /&gt;!&lt;BR /&gt;route-map ALT-GATEWAY permit 10&lt;BR /&gt;&amp;nbsp;match ip address acl_ISPB-PBR&lt;BR /&gt;&amp;nbsp;set ip default next-hop 2.2.2.1&lt;BR /&gt;!&lt;BR /&gt;route inf_ISPA 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Oct 2017 22:25:48 GMT</pubDate>
    <dc:creator>tato386</dc:creator>
    <dc:date>2017-10-24T22:25:48Z</dc:date>
    <item>
      <title>Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3203146#M1065312</link>
      <description>&lt;P&gt;I have an ASA (9.6.3) with two interfaces connected to the Internet.&amp;nbsp; The ASA default route is pointing to ISP A and I have PAT and NAT using ISP A working fine.&amp;nbsp; I have a route-map using PBR that sets default next hop for certain clients to ISP B.&amp;nbsp; For the clients using ISP B I also have PAT and NAT setup.&amp;nbsp; PAT works fine and NAT works fine for _outbound_ traffic but I cannot get any inbound services to work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Test show that it is not a problem with rules or NAT because if I add a static route on the ASA that uses ISP B for a particular Internet IP the inbound works.&amp;nbsp; So I guess I need to add something else for NAT/PBR to work but I am not sure what.&amp;nbsp; Any ideas?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;BR /&gt;Diego&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3203146#M1065312</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2020-02-21T14:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3203158#M1065314</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/317180"&gt;@tato386&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Really looks like routing problem, probably asymmetric routing. Probably a capture will give you the answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;If possible, share you config here so that we can take a look.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-If I helped you somehow, please, rate it as useful.-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Oct 2017 18:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3203158#M1065314</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-10-22T18:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3203580#M1065316</link>
      <description>&lt;P&gt;Hi Diego,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please send me the configuration related to PBR that you have done on ASA?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2017 14:27:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3203580#M1065316</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-10-23T14:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3204579#M1065317</link>
      <description>&lt;P&gt;sanitized config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA Version 9.6(3)1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif inf_Data&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.1.254 255.255.255.0&lt;BR /&gt;&amp;nbsp;policy-route route-map ALT-GATEWAY&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;desc /30 with /29 routeable block&lt;BR /&gt;&amp;nbsp;nameif inf_ISPB&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 2.2.2.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;nameif inf_ISPA&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 1.1.1.2 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;object network host1&lt;BR /&gt;&amp;nbsp;host 10.1.1.20&lt;BR /&gt;object network net_ISPB-PublicBlock&lt;BR /&gt;&amp;nbsp;subnet 3.3.3.0 255.255.255.248&lt;BR /&gt;object network ip_ISPB-NAT&lt;BR /&gt;&amp;nbsp;host 3.3.3.1&lt;/P&gt;
&lt;P&gt;access-list acl_Firewall-ISPA extended permit icmp any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list acl_Firewall-ISPB extended permit icmp any any&lt;BR /&gt;access-list acl_Firewall-ISPB extended permit tcp any object host1 eq telnet&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list acl_ISPB-PBR extended permit ip object host1 any4&lt;BR /&gt;access-list acl_ISPB-PBR extended deny ip any4 any4&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;object network host1&lt;BR /&gt;&amp;nbsp;nat (inf_Data,any) static ip_ISPB-NAT&lt;BR /&gt;!&lt;BR /&gt;access-group acl_Firewall-ISPB in interface inf_ISPB&lt;BR /&gt;access-group acl_Firewall-ISPA in interface inf_ISPA&lt;BR /&gt;!&lt;BR /&gt;route-map ALT-GATEWAY permit 10&lt;BR /&gt;&amp;nbsp;match ip address acl_ISPB-PBR&lt;BR /&gt;&amp;nbsp;set ip default next-hop 2.2.2.1&lt;BR /&gt;!&lt;BR /&gt;route inf_ISPA 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2017 22:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3204579#M1065317</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2017-10-24T22:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3205626#M1065318</link>
      <description>&lt;P&gt;Hi Diego,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please run packet tracer as mentioned below and share the output with us?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet tracer input int_ISPB &lt;/STRONG&gt;tcp&lt;STRONG&gt; 8.8.8.8 12121 3.3.3.1 23 detailed&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2017 11:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3205626#M1065318</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-10-26T11:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3205685#M1065319</link>
      <description>&lt;P&gt;The packet trace looks as it should.&amp;nbsp; The problem is that the ASA is trying to reply out of the wrong interface.&amp;nbsp; If I add a static route to 8.8.8.8 using inf_ISPB it works.&amp;nbsp; So it seems that PBR is respected when the inside host initiates a flow to the outside but it is not used for packets initiated from outside to inside hosts. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;asa#packet input inf_ISPB tcp 8.8.8.8 1212 3.3.3.1 23 detailed&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 1&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: UN-NAT&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype: static&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;object network host1&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;nat (inf_Data,any) static ip_Test&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;NAT divert to egress interface inf_Data&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Untranslate 3.3.3.1/23 to 10.1.1.20/23&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 2&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype: log&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-group inf_ISPB_access_in in interface inf_ISPB&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-list inf_ISPB_access_in extended permit tcp any object host1 eq telnet&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;in&amp;nbsp; id=0x2aaac3165830, priority=13, domain=permit, deny=false&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=948, user_data=0x2aaab97918c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.1.1.20, mask=255.255.255.255, port=23, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inf_ISPB, output_ifc=any&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 3&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: CONN-SETTINGS&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;class-map class-default&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;match any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;class class-default&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp; set connection conn-max 0 embryonic-conn-max 0 random-sequence-number disable&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;service-policy global_policy global&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;in&amp;nbsp; id=0x2aaac3076560, priority=7, domain=conn-set, deny=false&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3658, user_data=0x2aaac3073670, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inf_ISPB, output_ifc=any&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 4&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: NAT&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype: per-session&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;in&amp;nbsp; id=0x2aaac099fcb0, priority=0, domain=nat-per-session, deny=false&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1074533, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 5&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: IP-OPTIONS&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;in&amp;nbsp; id=0x2aaac137e530, priority=0, domain=inspect-ip-options, deny=true&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3977, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inf_ISPB, output_ifc=any&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 6&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: NAT&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype: rpf-check&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;object network host1&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;nat (inf_Data,any) static ip_Test&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;out id=0x2aaac40c3f00, priority=6, domain=nat-reverse, deny=false&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=972, user_data=0x2aaac40c5180, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.1.1.20, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=inf_Data&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 7&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: USER-STATISTICS&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype: user-statistics&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;out id=0x2aaac306c690, priority=0, domain=user-statistics, deny=false&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1023068, user_data=0x2aaac2ffd2c0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=inf_Data&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 8&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: NAT&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype: per-session&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;in&amp;nbsp; id=0x2aaac099fcb0, priority=0, domain=nat-per-session, deny=false&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1074535, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 9&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: IP-OPTIONS&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;in&amp;nbsp; id=0x2aaac1317820, priority=0, domain=inspect-ip-options, deny=true&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=789889, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inf_Data, output_ifc=any&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 10&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: USER-STATISTICS&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype: user-statistics&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;out id=0x2aaac306d630, priority=0, domain=user-statistics, deny=false&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3259, user_data=0x2aaac2ffd2c0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=inf_ISPB&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Phase: 11&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Type: FLOW-CREATION&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Subtype:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;New flow created with id 1019957, packet dispatched to next module&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Module information for forward flow ...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_tracer_drop&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_inspect_ip_options&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_tcp_normalizer&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_translate&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_adjacency&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_fragment&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_ifc_stat&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Module information for reverse flow ...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_tracer_drop&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_inspect_ip_options&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_translate&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_tcp_normalizer&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_adjacency&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_fp_fragment&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;snp_ifc_stat&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Result:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;input-interface: inf_ISPB&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;input-status: up&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;input-line-status: up&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;output-interface: inf_Data&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;output-status: up&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Action: allow&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2017 12:48:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3205685#M1065319</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2017-10-26T12:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3206343#M1065320</link>
      <description>&lt;P&gt;Hi Diego,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please make the following changes on the route map and test it?&lt;/P&gt;
&lt;P&gt;route-map ALT-GATEWAY permit 10&lt;BR /&gt;match ip address acl_ISPB-PBR&lt;BR /&gt;no set ip default next-hop 2.2.2.1&lt;BR /&gt;set ip next-hop 2.2.2.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this still not working, then please take the captures of the traffic to find out the issue.&lt;BR /&gt;access-list test extended permit tcp any4 host 10.1.1.20 23&lt;BR /&gt;access-list test extended permit tcp host 10.1.1.20 23 any4&lt;BR /&gt;!&lt;BR /&gt;capture capi interface inf_Data access-list test&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2017 11:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3206343#M1065320</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-10-27T11:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3206856#M1065321</link>
      <description>&lt;P&gt;I adjusted the route-map as you suggested and it didn't make a difference.&amp;nbsp; I also played around with moving the NAT to "before object NAT" and that didn't make a difference.&amp;nbsp; I have attached the packet capture and it seems OK.&amp;nbsp; It doesn't show the translated public IP but I am sure that it working because I have tested it using sites like ipchicken.com.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I appreciate your help very much but I am starting to think this is a bug. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Oct 2017 15:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3206856#M1065321</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2017-10-28T15:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3215628#M1065322</link>
      <description>&lt;P&gt;According to TAC this is something that has worked in older versions but no longer available in newer ASA versions.&amp;nbsp; I am pretty sure I have done this in the past so it does not sound totally off base. &amp;nbsp;Not the answer I wanted to hear and very disappointing to have a useful feature removed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks to all who tried to help.&lt;/P&gt;
&lt;P&gt;Diego&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2017 13:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3215628#M1065322</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2017-11-13T13:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3824821#M1065323</link>
      <description>&lt;P&gt;Did you ever get this to work?&amp;nbsp; I face the same issue when attempting to use a route-map.&amp;nbsp; I have to add the route for the route-map to receive traffic from the outside, which kinda defeats the purpose.&amp;nbsp; May as well just define a pile of routes instead.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice would be appreciated!!&lt;/P&gt;</description>
      <pubDate>Sat, 23 Mar 2019 13:31:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3824821#M1065323</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2019-03-23T13:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3825873#M1065324</link>
      <description>&lt;P&gt;Sorry I was never able to get this to work but there have been several software updates to ASA since I was messing around with this. Have you tried using a recent build?&amp;nbsp; Maybe they changed the behavior back?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 21:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3825873#M1065324</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2019-03-25T21:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3949708#M1065325</link>
      <description>&lt;P&gt;The 'old way' of making this type of setup work was to include a floating static route for the second internet path&lt;/P&gt;&lt;P&gt;Referring to your config above include: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;r&lt;FONT face="courier new,courier"&gt;oute inf_ISPB 0.0.0.0 0.0.0.0 2.2.2.2 100&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This adds internet route to the table, that not used for normal traffic due to the higher metric but completes the picture for PBR / NAT inbound traffic flows&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 09:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3949708#M1065325</guid>
      <dc:creator>chris-goulder</dc:creator>
      <dc:date>2019-10-29T09:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3950118#M1065326</link>
      <description>&lt;P&gt;At this time I don't have a setup where I can test this but I surely appreciate the info.&amp;nbsp; It might come in handy at some point.&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 21:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/3950118#M1065326</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2019-10-29T21:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4057320#M1068615</link>
      <description>&lt;P&gt;I can verify that this works. Thank you Chris!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 02:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4057320#M1068615</guid>
      <dc:creator>Nishanna Gunasekera</dc:creator>
      <dc:date>2020-04-02T02:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4057823#M1068650</link>
      <description>Thanks for sorting this out. I will test at some future point.</description>
      <pubDate>Thu, 02 Apr 2020 16:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4057823#M1068650</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2020-04-02T16:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4088928#M1070349</link>
      <description>&lt;P&gt;I just ha the opportunity to try this on an ASA5515 running 9.12.3.9 and it worked like a charm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you CG!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Diego&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 21:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4088928#M1070349</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2020-05-19T21:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4089353#M1070380</link>
      <description>good to hear. As you know it worked outbound, but not inbound for me. Wht did you do differently?</description>
      <pubDate>Wed, 20 May 2020 14:21:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4089353#M1070380</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2020-05-20T14:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4089414#M1070386</link>
      <description>&lt;P&gt;Not exactly my case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My outbound was always working via PBR.&amp;nbsp; My issue was inbound and the floating static fixed it.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 15:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4089414#M1070386</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2020-05-20T15:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4089440#M1070387</link>
      <description>understood. Yes it works outbound and if you initiate from inside. Outside-in didn't work for me at initiation. The packet just dropped. thanks!</description>
      <pubDate>Wed, 20 May 2020 16:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4089440#M1070387</guid>
      <dc:creator>dbogdan</dc:creator>
      <dc:date>2020-05-20T16:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound NAT issue with PBR on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4090528#M1070419</link>
      <description>&lt;P&gt;The reason for this lays with the ASA connection table - once a tcp connection tuple is in the connection table that is used for applicable flows until the flow ends or the entry times out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PBR is&amp;nbsp;used to establish a flow using different routing to that in the general routing table, but once the flow is established and the entry in the connection table created, subsequent packets are handled just by the path identified in the connection table. PBR is not used once there is an entry in the connection table&amp;nbsp;for a traffic flow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also it is worth noting that typically when configuring PBR you are defining route policy for inside initiated traffic flows heading outside and that not have any bearing on outside initiated inbound traffic flows trying to head inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what is likely happening in your 'outside initiated traffic did not get through' case is along the lines of: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. tcp syn packet arrives at an outside i/f (but not the one holding the default route)&lt;/P&gt;&lt;P&gt;2. this allowed by the acl in place&lt;/P&gt;&lt;P&gt;3. this initiates the creation of an entry&amp;nbsp;in the connection table for the tcp src|dst flow&lt;/P&gt;&lt;P&gt;4. syn packet forwarded to the inside host&lt;/P&gt;&lt;P&gt;5. inside host sends a syn/ack packet back to the source via the ASA&lt;/P&gt;&lt;P&gt;6. ASA checks its connection table and finds an entry for the tcp flow (entry added at 3. above)&lt;/P&gt;&lt;P&gt;7. As a connection table entry exists it is used and any PBR config does not come into play&lt;/P&gt;&lt;P&gt;8. ASA tries to forward the syn/ack reply packet out of the outside interface the flow came in on (connection table information)&lt;/P&gt;&lt;P&gt;9. this fails as there no applicable route in the ASA route table that would handle the flow on that i/f and the packet gets dropped&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you are doing by putting a floating static default route on your 'other' outside i/f is fixing the problem at step 9. in the above list.&amp;nbsp;The ASA will see the floating default route on the interface and thus will be able to L3 forward it out of the outside interface the flow came in on&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This behaviour can also crop up in asymmetric routing cases, whether PBR involved or not. The classic symptom being you can ping something but you cant get a tcp connection to establish. Depending on the scenario involved sometimes a floating static can help, other times you have to use a tcp state bypass policy (kludge) to fix it - but overall, unless of course you have no other option, the best solution is to try and fix/avoid the asymmetric routing in the first place as even if you find some config that will work it will likely break again later when something innocuous on the far side of your network changes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Chris&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 07:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-nat-issue-with-pbr-on-asa/m-p/4090528#M1070419</guid>
      <dc:creator>chris-goulder</dc:creator>
      <dc:date>2020-05-22T07:13:25Z</dc:date>
    </item>
  </channel>
</rss>

