<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why can't I reach internal Web Server from outside asa 9.8(2)? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684693#M1093306</link>
    <description>&lt;DIV&gt;ciscoasa(config)# sh nat&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Auto NAT Policies (Section 2)&lt;/DIV&gt;&lt;DIV&gt;1 (dmz) to (outside) source static WWW-INT WWW-EXT &amp;nbsp;service tcp www www&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &lt;STRONG&gt;translate_hits = 0, untranslate_hits = 0&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Manual NAT Policies (Section 3)&lt;/DIV&gt;&lt;DIV&gt;1 (inside) to (outside) source dynamic any interface&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 726, untranslate_hits = 1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;the hit is zero for both direction&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Sat, 10 Sep 2022 18:49:13 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-09-10T18:49:13Z</dc:date>
    <item>
      <title>Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684549#M1093284</link>
      <description>&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.101.225 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network WWW-EXT&lt;BR /&gt;host x.x.x.7&lt;BR /&gt;object network WWW-INT&lt;BR /&gt;host 192.168.101.225&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object WWW-INT eq www&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network WWW-INT&lt;BR /&gt;nat (dmz,outside) static WWW-EXT service tcp www www&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;nat (dmz,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.8 1&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 03:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684549#M1093284</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T03:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684553#M1093285</link>
      <description>&lt;P&gt;i guess there can be a missing ACLs. check below for sample&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 04:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684553#M1093285</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2022-09-10T04:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684561#M1093288</link>
      <description>&lt;P&gt;Hi, you can use asa packet tracer tool to understand the packet flow, nat,acl, egress iface. also check "show xlate local&amp;nbsp;&lt;SPAN&gt;192.168.101.225"&amp;nbsp; if that show correct&amp;nbsp;&lt;/SPAN&gt;translation.&lt;/P&gt;
&lt;P&gt;if you use ssh, "packet-tracer outside input tcp 1.1.1.1 111&amp;nbsp;&lt;SPAN&gt;x.x.x.3 443 detail"&amp;nbsp; will provide more info such as NAT, acl. hope this help.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 06:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684561#M1093288</guid>
      <dc:creator>Asmat Sulaiman</dc:creator>
      <dc:date>2022-09-10T06:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684583#M1093289</link>
      <description>&lt;P&gt;Sorry I now see it, You already have static NAT.&lt;/P&gt;&lt;P&gt;Just check the NAT order with&lt;/P&gt;&lt;P&gt;Show nat&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think static come after dynamic&lt;/P&gt;&lt;P&gt;If yes&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only add&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 in static nat to push it up.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 11:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684583#M1093289</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-09-10T11:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684613#M1093290</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1390933"&gt;@davidzw98&lt;/a&gt; you've defined the IP address of the webserver host object WWW-INT used in the ACL and NAT, as the IP address of the DMZ interface IP address.....which would not work.&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/4&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.101.&lt;STRONG&gt;225&lt;/STRONG&gt; 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network WWW-INT&lt;BR /&gt;host 192.168.101.&lt;STRONG&gt;225&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Change the WWW-INT object IP address to the real IP address of the webserver in the DMZ.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 11:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684613#M1093290</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-10T11:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684644#M1093292</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="packetTracer.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/161973i30CA127B0BD5D8AC/image-size/large?v=v2&amp;amp;px=999" role="button" title="packetTracer.png" alt="packetTracer.png" /&gt;&lt;/span&gt;Thank you for everyone, this is fix, but still not work.&lt;BR /&gt;(packet tracer going out from WEB SERVER to internet is ok.)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.101.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network WWW-EXT&lt;BR /&gt;host x.x.x.7&lt;BR /&gt;object network WWW-INT&lt;BR /&gt;host 192.168.101.225&lt;BR /&gt;object network dns-server&lt;BR /&gt;host 192.168.1.53&lt;BR /&gt;object network inside-subnet&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object WWW-INT eq www&lt;BR /&gt;access-list dmz_acl extended permit udp any object dns-server eq domain&lt;BR /&gt;access-list dmz_acl extended deny ip any object inside-subnet&lt;BR /&gt;access-list dmz_acl extended permit ip any any&lt;BR /&gt;!&lt;BR /&gt;object network WWW-INT&lt;BR /&gt;nat (dmz,outside) static WWW-EXT service tcp www www&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;access-group dmz_acl in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.8 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 14:23:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684644#M1093292</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T14:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684645#M1093293</link>
      <description>&lt;P&gt;there are different between show nat and show run nat&amp;nbsp;&lt;BR /&gt;can you share the output of both&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 14:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684645#M1093293</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-09-10T14:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684646#M1093294</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;ciscoasa(config)# sh nat&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Auto NAT Policies (Section 2)&lt;/DIV&gt;&lt;DIV&gt;1 (dmz) to (outside) source static WWW-INT WWW-EXT &amp;nbsp;service tcp www www&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Manual NAT Policies (Section 3)&lt;/DIV&gt;&lt;DIV&gt;1 (inside) to (outside) source dynamic any interface&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 726, untranslate_hits = 1&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config)#&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config)# show run nat&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;object network WWW-INT&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (dmz,outside) static WWW-EXT service tcp www www&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 14:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684646#M1093294</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T14:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684653#M1093295</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1390933"&gt;@davidzw98&lt;/a&gt; you've specified the wrong interface in packet-tracer, the source interface would be "OUTSIDE" not "DMZ" - hence the drop. The DMZ interface is the destination interface. Also use the NAT IP address (WWW-EXT) as the destination in packet-tracer not the real IP address.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 15:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684653#M1093295</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-10T15:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684658#M1093296</link>
      <description>&lt;P&gt;Ok, thank you for pointing my mistakes. Why can't I open 107.130.54.77 ? if it point to 192.168.101.225, it has APACHE running.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="packetTracer2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/161975iB447A7E4473D3ADB/image-size/large?v=v2&amp;amp;px=999" role="button" title="packetTracer2.png" alt="packetTracer2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 15:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684658#M1093296</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T15:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684659#M1093297</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1390933"&gt;@davidzw98&lt;/a&gt; well that output indicates the ASA configuration is ok, so perhaps check the actual server. &lt;/P&gt;
&lt;P&gt;Does the server running apache have a default gateway of the ASA?&lt;/P&gt;
&lt;P&gt;Is there a local firewall on the server running apache that could be blocking external access? If so reconfigure it or disable it.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 15:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684659#M1093297</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-10T15:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684673#M1093298</link>
      <description>&lt;P&gt;It is in 101 zone, so I use 192.168.101.1 as defaultrouter.&lt;/P&gt;&lt;P&gt;do you means use ASA's 192.168.1.1 or ISP's gateway?&lt;/P&gt;&lt;P&gt;I can open Apache from inside zone 192.168.1.* by opening 192.168.101.225&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 16:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684673#M1093298</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T16:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684674#M1093299</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1390933"&gt;@davidzw98&lt;/a&gt; that sounds fine then, just checking the DMZ interface of 192.168.101.1 would need to be configured as the default gateway of the server.&lt;/P&gt;
&lt;P&gt;Why open it from the inside zone/network? You said you want to allow access from the outside.&lt;/P&gt;
&lt;P&gt;TCP/80 needs to be open &lt;STRONG&gt;on the server firewall &lt;/STRONG&gt;from any IP address if you want to connect to the apache server from the internet.&lt;/P&gt;
&lt;P&gt;For testing disable the firewall on the server and test connectivity from the internet to prove the ASA is working.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 16:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684674#M1093299</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-10T16:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684676#M1093300</link>
      <description>&lt;P&gt;&amp;gt;&lt;SPAN&gt;Why open it from the inside zone/network?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;just to check if apache24 is running.&lt;/P&gt;&lt;P&gt;I think server firewall is not an issue, it can host PDF file on internet without ASA.&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 16:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684676#M1093300</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T16:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684680#M1093301</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1390933"&gt;@davidzw98&lt;/a&gt; The packet-tracer confirms it should work now, so what else do you have in your environment that could be causing an issue?&lt;/P&gt;
&lt;P&gt;Regardless if you don't think disabling the local server firewall will be an issue, test it to confirm.&lt;/P&gt;
&lt;P&gt;Take a packet capture on the server to confirm whether packets even reach the server from the internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 17:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684680#M1093301</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-10T17:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684682#M1093302</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This is what I got:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ciscoasa#&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;ciscoasa# packet-tracer input outside tcp 204.79.197.212 12345 107.130.54.77 80&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: UN-NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: static&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;object network WWW-INT&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (dmz,outside) static WWW-EXT service tcp www www&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;NAT divert to egress interface dmz&lt;/DIV&gt;&lt;DIV&gt;Untranslate 107.130.54.77/80 to 192.168.101.225/80&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype: log&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;access-group OUTSIDE in interface outside&lt;/DIV&gt;&lt;DIV&gt;access-list OUTSIDE extended permit tcp any object WWW-INT eq www&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config: &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: rpf-check&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;object network WWW-INT&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (dmz,outside) static WWW-EXT service tcp www www&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 8&lt;/DIV&gt;&lt;DIV&gt;Type: FLOW-CREATION&lt;/DIV&gt;&lt;DIV&gt;Subtype:&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;New flow created with id 3637, packet dispatched to next module&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: outside&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: dmz&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: allow&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;ciscoasa# packet-tracer input outside tcp 204.79.197.212 12345 192.168.101.225 80&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: Resolve Egress Interface&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;found next-hop 192.168.101.225 using egress ifc &amp;nbsp;dmz&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype: log&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;access-group OUTSIDE in interface outside&lt;/DIV&gt;&lt;DIV&gt;access-list OUTSIDE extended permit tcp any object WWW-INT eq www&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4 &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: rpf-check&lt;/DIV&gt;&lt;DIV&gt;Result: DROP&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;object network WWW-INT&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (dmz,outside) static WWW-EXT service tcp www www&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: outside&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: dmz&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: drop&lt;/DIV&gt;&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;ciscoasa#&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 17:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684682#M1093302</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T17:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684683#M1093303</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1390933"&gt;@davidzw98&lt;/a&gt; thats a packet &lt;STRONG&gt;tracer&lt;/STRONG&gt; output not the requested packet &lt;STRONG&gt;capture&lt;/STRONG&gt;. Regardless, the first packet-tracer you using the correct destination IP address and therefore the result is allow, but the second packet-tracer you are using incorrect destination IP address. In packet-tracer you don't specify the destination as the real IP address if using NAT.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 17:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684683#M1093303</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-10T17:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684684#M1093304</link>
      <description>&lt;P&gt;OK. Thank you! I&amp;nbsp; will try to see if I can figure out.&lt;/P&gt;&lt;P&gt;At mean time, just let you know ,&lt;/P&gt;&lt;P&gt;I bought this ASA5508 from ebay brand new. Is it something internally not allow me to use it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Haven't registered PAK and PIN, don't know how to do it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;eBay item number:&lt;/SPAN&gt;&lt;SPAN class=""&gt;193807253089&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;New message from: cnedirect&lt;BR /&gt;Hello&lt;/P&gt;&lt;P&gt;Unfortunately this is not something we could help with,&lt;BR /&gt;I will mention we have sold roughly 500 of these and never had any issues&lt;BR /&gt;with the buyers having problems with this. Unfortunately we do not have&lt;BR /&gt;any Cisco experts on staff and don't specialize in Cisco,&lt;BR /&gt;we get Cisco overstock product from time to time.&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;</description>
      <pubDate>Sat, 10 Sep 2022 17:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684684#M1093304</guid>
      <dc:creator>davidzw98</dc:creator>
      <dc:date>2022-09-10T17:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: Why can't I reach internal Web Server from outside asa 9.8(2)?</title>
      <link>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684693#M1093306</link>
      <description>&lt;DIV&gt;ciscoasa(config)# sh nat&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Auto NAT Policies (Section 2)&lt;/DIV&gt;&lt;DIV&gt;1 (dmz) to (outside) source static WWW-INT WWW-EXT &amp;nbsp;service tcp www www&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &lt;STRONG&gt;translate_hits = 0, untranslate_hits = 0&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Manual NAT Policies (Section 3)&lt;/DIV&gt;&lt;DIV&gt;1 (inside) to (outside) source dynamic any interface&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 726, untranslate_hits = 1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;the hit is zero for both direction&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sat, 10 Sep 2022 18:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-can-t-i-reach-internal-web-server-from-outside-asa-9-8-2/m-p/4684693#M1093306</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-09-10T18:49:13Z</dc:date>
    </item>
  </channel>
</rss>

