<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CIsco ASA Firewall NAT services not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854478#M1101589</link>
    <description>&lt;P&gt;Yes and hope global inspection have these protocol&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jun 2023 11:38:19 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-06-14T11:38:19Z</dc:date>
    <item>
      <title>CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854342#M1101564</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;We have a Cisco ASA firewall that is running&amp;nbsp; ASA version14(4)23. This firewall is meant to replace our current firewall, we have done all the configurations including NAT and Access lists, when we connect the ASA into production, all outgoing traffic is working properly (We can browse the Internet), however, on the incoming services that we have NATed to internal private address, only one service is working and the rest are not able to connect. Our NAT and Access-list configurations look to be good but there is something preventing these services from connecting, we have tried upgrading the firmware but it did not solve the problem. What could be the issue and how can we troubleshoot why the incoming NATed services are not woking?&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 07:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854342#M1101564</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-14T07:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854420#M1101581</link>
      <description>&lt;P&gt;Which service we talking about?&lt;/P&gt;
&lt;P&gt;Do add these services to inspection of asa?&lt;/P&gt;
&lt;P&gt;So you use real ip or mapped ip in acl?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 10:21:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854420#M1101581</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-14T10:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854436#M1101582</link>
      <description>&lt;P&gt;&lt;EM&gt;Which service we talking about?&amp;nbsp;&lt;/EM&gt; &amp;nbsp; the application that is working is running HTTPS on port 443, the others that are not working use TCP ports&amp;nbsp; 6443, 8443, 9010, 8080&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Do add these services to inspection of asa?&amp;nbsp; &amp;nbsp; -&amp;nbsp; &amp;nbsp;&lt;/EM&gt;They are not added to inspection&lt;/P&gt;&lt;P&gt;So you use real ip or mapped ip in acl?&amp;nbsp; &amp;nbsp;-&amp;nbsp; the ACL on the Outside Interface is using real (private) IPs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 10:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854436#M1101582</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-14T10:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854455#M1101586</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I dont know how did you build the NAT but if one service is working chances are the problem is not NAT.&amp;nbsp; If you telnet from outside to the TCP port what do you see on the firewall logs?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 11:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854455#M1101586</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-14T11:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854459#M1101587</link>
      <description>&lt;P&gt;We need to add it to inspection&lt;/P&gt;
&lt;P&gt;If there is no such protocol then we need to bypass this protocol from asa global inspection.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 11:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854459#M1101587</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-14T11:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854476#M1101588</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; do you suggest we add the protocols to the global_policy&amp;nbsp; using class inspection_default?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 11:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854476#M1101588</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-14T11:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854478#M1101589</link>
      <description>&lt;P&gt;Yes and hope global inspection have these protocol&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 11:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854478#M1101589</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-14T11:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854485#M1101593</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; global inspection does not allow custom protocols, and these are not options in inspection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 11:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854485#M1101593</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-14T11:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854490#M1101595</link>
      <description>&lt;P&gt;can you share the ACL/NAT config of ASA&amp;nbsp;&lt;BR /&gt;thanks&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 11:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854490#M1101595</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-14T11:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854513#M1101597</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; see the config below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NBS-BT-INTERNET-ASA5525# sh run nat&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AlienVault 102.33.155.11 destination static ALIENVAULT_DESTINATIONS ALIENVAULT_DESTINATIONS service HTTPS HTTPS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static NETGUARDIANS 102.33.155.15 destination static NETGUARDIANS_ACCESS NETGUARDIANS_ACCESS service HTTPS HTTPS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static Internet_banking INTERNET_BANKING_GLOBAL service HTTPS HTTPS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static Mobile_banking SMARTAPP_GLOBAL service 6443 6443&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.130.102 obj-102.33.155.11 destination static BITCRACK_SOURCE_IPs BITCRACK_SOURCE_IPs service HTTPS HTTPS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.130.68 obj-10.0.21.254 destination static SWIFT_SUBNET SWIFT_SUBNET&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.130.57-NI-LIVE obj-10.40.200.100-NI-TRANSLATED destination static NI-TO-NBS NI-TO-NBS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.1.63-NI-TEST obj-10.40.200.201-NI-TEST-TRANSLATED destination static NI-TO-NBS NI-TO-NBS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static Internet_banking obj-10.40.200.102 destination static NI-TO-NBS NI-TO-NBS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.1.201 obj-10.40.200.202 destination static NI-TO-NBS NI-TO-NBS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.202 obj-10.40.200.203 destination static NI-TO-NBS NI-TO-NBS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source dynamic NBS_INTERNAL obj-10.0.21.243 destination static SWIFT_SUBNET SWIFT_SUBNET&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static REMOTE_ACCESS_IPs REMOTE_ACCESS_IPs destination static REMOTE_ACCESS_POOL REMOTE_ACCESS_POOL&lt;BR /&gt;nat (INSIDE,OUTSIDE) source dynamic NBS_INTERNAL obj-10.40.200.101 destination static NI-TO-NBS NI-TO-NBS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static NBS_INTERNAL NBS_INTERNAL destination static NETWORK_OBJ_10.51.200.0_24 NETWORK_OBJ_10.51.200.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.33.155.13 service tcp_8443 tcp_8443&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.33.155.13 service tcp_8080 tcp_8080&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.33.155.13 service tcp_7412 tcp_7412&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.1.153 SMARTAPP_GLOBAL service HTTPS HTTPS&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.94 obj-102.33.155.11 service tcp_81 tcp_81&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.138 obj-102.33.155.143 service tcp_81 tcp_81&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.138 obj-102.33.155.143 service tcp_83 tcp_83&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.138 obj-102.33.155.143 service tcp_86 tcp_86&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.205 obj-102.33.155.12 service tcp_81 tcp_81&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.205 obj-102.33.155.12 service tcp_84 tcp_84&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.205 obj-102.33.155.12 service tcp_85 tcp_85&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.205 obj-102.33.155.12 service tcp_86 tcp_86&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.205 obj-102.33.155.12 service tcp_88 tcp_88&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.205 obj-102.33.155.12 service tcp_90 tcp_90&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.205 obj-102.33.155.12 service tcp_91 tcp_91&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.202 obj-102.33.155.10&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static obj-10.40.129.152 obj-102.33.155.9&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.111.0&lt;BR /&gt;nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;object network obj-192.168.222.0&lt;BR /&gt;nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic NBS_INTERNAL interface&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic NBS_OLD_SUBNET interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list OUTSIDE remark MANAGEMENT TRAFFIC&lt;BR /&gt;access-list OUTSIDE extended permit udp 102.33.155.0 255.255.255.0 object NMS object-group DM_INLINE_UDP_1&lt;BR /&gt;access-list OUTSIDE remark BitCrack Access&lt;BR /&gt;access-list OUTSIDE extended permit tcp object-group BITCRACK_SOURCE_IPs object obj-10.40.130.102 eq https&lt;BR /&gt;access-list OUTSIDE remark AML SFTP Access&lt;BR /&gt;access-list OUTSIDE extended permit tcp object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_2 eq ssh&lt;BR /&gt;access-list OUTSIDE remark NI TO NBS TEST - Port 9010&lt;BR /&gt;access-list OUTSIDE extended permit tcp object-group NI-TO-NBS object NBS_NI_TEST eq 9010&lt;BR /&gt;access-list OUTSIDE remark NI TO NBS LIVE - Port 9010&lt;BR /&gt;access-list OUTSIDE extended permit tcp object-group NI-TO-NBS object obj-10.40.130.57-NI-LIVE eq 9010&lt;BR /&gt;access-list OUTSIDE extended permit tcp object-group NI-TO-NBS object obj-10.40.1.63-NI-TEST eq 10024&lt;BR /&gt;access-list OUTSIDE extended permit tcp object-group NI-TO-NBS object obj-10.40.1.63-NI-TEST eq 10030&lt;BR /&gt;access-list OUTSIDE extended permit tcp any host 102.33.155.93 eq 81&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object INTERNET_BANKING_GLOBAL eq https&lt;BR /&gt;access-list OUTSIDE remark Internet Banking&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object Internet_banking eq https&lt;BR /&gt;access-list OUTSIDE remark INTERNET BANKING&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object obj-10.40.129.138_81 eq 81&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object obj-10.40.129.138_86 eq 86&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object obj-10.40.129.138_83 eq 83&lt;BR /&gt;access-list OUTSIDE remark Mobile Banking&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object Mobile_banking eq 6443&lt;BR /&gt;access-list OUTSIDE remark FTP DATA TO NETMONITOR FROM NBS INTERNET HOSTS&lt;BR /&gt;access-list OUTSIDE extended permit tcp object NBS_INT_PUBLIC object NET_MONITOR object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list OUTSIDE remark Netflow, SNMP, FTP, and SYSLOG&lt;BR /&gt;access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_1 object NBS_INT_PUBLIC object-group NET_MGNT_STATIONS&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object obj-10.40.129.202 eq 6443&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object DEV_TEST object-group DM_INLINE_TCP_3&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object obj-10.40.129.94 eq 81&lt;BR /&gt;access-list OUTSIDE remark PAYDAY LOAN APPLICATION&lt;BR /&gt;access-list OUTSIDE extended permit tcp any host 10.40.129.205 object-group INSTANT_LOANS&lt;BR /&gt;access-list OUTSIDE remark AMEYO CALL CENTER&lt;BR /&gt;access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_2 any object AMEYO_SERVER&lt;BR /&gt;access-list OUTSIDE extended permit object HTTPS object-group DM_INLINE_NETWORK_5 object AlienVault&lt;BR /&gt;access-list OUTSIDE remark NETGUARDIANS&lt;BR /&gt;access-list OUTSIDE extended permit object HTTPS object-group NETGUARDIANS_ACCESS object NETGUARDIANS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 12:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854513#M1101597</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-14T12:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854648#M1101609</link>
      <description>&lt;P&gt;packet tracer input OUTSIDE tcp &amp;lt;select any IP from the outside subnet&amp;gt; 1234 &amp;lt;mapped IP of server&amp;gt; 8080 detail&amp;nbsp;&lt;BR /&gt;packet tracer input OUTSIDE tcp &amp;lt;select any IP from the outside subnet&amp;gt; 1234 &amp;lt;mapped IP of server&amp;gt; 8443&amp;nbsp;detail&amp;nbsp;&lt;BR /&gt;packet tracer input OUTSIDE tcp &amp;lt;select any IP from the outside subnet&amp;gt; 1234 &amp;lt;mapped IP of server&amp;gt; 7412&amp;nbsp;detail&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;please share the output are the packet drop in&amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;NAT rpf-check&lt;/FONT&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 14:58:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4854648#M1101609</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-14T14:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4855528#M1101672</link>
      <description>&lt;P&gt;See below the packet tracer output, there is &lt;STRONG&gt;no drop in NAT rpf-check&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;NBS-BT-INTERNET-ASA5525# packet-tracer input OUTSIDE tcp 82.54.45.8 1234 102.36.145.13 8080 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.36.145.13 service tcp_8080 tcp_8080&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE&lt;BR /&gt;Untranslate 102.36.145.13/8080 to 10.40.129.50/8080&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE in interface OUTSIDE&lt;BR /&gt;access-list OUTSIDE remark AMEYO CALL CENTER&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object AMEYO_SERVER object-group AMEYO_PORTS&lt;BR /&gt;object-group service AMEYO_PORTS tcp&lt;BR /&gt;port-object eq 7412&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 8080&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc58d2b0, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=0, user_data=0x7f5cd13b2a40, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.40.129.50, mask=255.255.255.255, port=8080, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.36.145.13 service tcp_8080 tcp_8080&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 82.54.45.8/1234 to 82.54.45.8/1234&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc672780, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x7f5cd6009280, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=102.36.145.13, mask=255.255.255.255, port=8080, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=INSIDE&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdb5891a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93539, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc439a80, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=69558, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdeccc400, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=9693, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.36.145.13 service tcp_8080 tcp_8080&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7f5cdc672b60, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x7f5cdc662e60, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.40.129.50, mask=255.255.255.255, port=8080, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=INSIDE&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdb5891a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93541, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc3d1ba0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=65726, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 73343, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.40.139.81 using egress ifc INSIDE&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.40.139.81 on interface INSIDE&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 0000.0c07.ac82 hits 2823 reference 2&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 18:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4855528#M1101672</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-15T18:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4855735#M1101683</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;this phase can indicate that traffic hit the acl of s2s VPN, after you clear this do clear packet tracer again and check the result&lt;BR /&gt;NOTE:- check the hits of acl of s2s VPN&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;&lt;BR /&gt;Phase: 6&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: VPN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: ipsec-tunnel-flow&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;in id=0x7f5cdeccc400, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hits=9693, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 20:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4855735#M1101683</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-15T20:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856135#M1101696</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you mean the traffic is matching a Site-to-Site VPN access-list thats why its not working?&lt;/P&gt;&lt;P&gt;i have checked the ACL for the VPN and there are no matches&lt;/P&gt;&lt;P&gt;However i we have the below crypto map configuration, is the highlighted line necessary? or could it be the one matching the traffic?&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE_map2 1 match address OUTSIDE_cryptomap&lt;BR /&gt;crypto map OUTSIDE_map2 1 set pfs&lt;BR /&gt;crypto map OUTSIDE_map2 1 set peer 196.26.195.234&lt;BR /&gt;crypto map OUTSIDE_map2 1 set ikev1 transform-set Trustlink_Prod&lt;BR /&gt;crypto map OUTSIDE_map2 1 set security-association lifetime seconds 3600&lt;BR /&gt;&lt;STRONG&gt;crypto map OUTSIDE_map2 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/STRONG&gt;&lt;BR /&gt;crypto map OUTSIDE_map2 interface OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 10:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856135#M1101696</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-16T10:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856265#M1101700</link>
      <description>&lt;P&gt;&lt;STRONG&gt;crypto map OUTSIDE_map2 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;No for IPSec vpn s2s this line not need'&lt;/P&gt;
&lt;P&gt;Remove it do packet-tracer again and see if phase 6 appear or not.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 12:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856265#M1101700</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-16T12:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856298#M1101701</link>
      <description>&lt;P&gt;I have removed the line&amp;nbsp; but packet tracer still is going through stage 6&lt;/P&gt;&lt;P&gt;I tried to do the same packet tracer on a firewall that is currently in production and has no issues and it is also showing the same phase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 13:51:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856298#M1101701</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-16T13:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856311#M1101702</link>
      <description>&lt;P&gt;Can yoh share the packet tracer of other asa' I need to compare.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 14:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856311#M1101702</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-16T14:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856314#M1101703</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Note that this one is using an older ASA version 8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;NBS-ASA-OUTSIDE# packet-tracer input outside tcp 41.21.36.145 1234 102.36.145.$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,Outside) tcp 102.36.145.8 6443 10.40.129.212 6443 netmask 255.255.255.255&lt;BR /&gt;match tcp DMZ host 10.40.129.212 eq 6443 Outside any&lt;BR /&gt;static translation to 102.36.145.8/6443&lt;BR /&gt;translate_hits = 1887, untranslate_hits = 455852&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate 102.36.145.8/6443 to 10.40.129.212/6443 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE-IN in interface Outside&lt;BR /&gt;access-list OUTSIDE-IN extended permit tcp any host 102.36.145.8 eq 6443&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xabb08770, priority=12, domain=permit, deny=false&lt;BR /&gt;hits=453026, user_data=0xa89f2bc0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;dst ip=102.36.145.8, mask=255.255.255.255, port=6443, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xab7de220, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;hits=13962431, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xaeb835b8, priority=17, domain=flow-export, deny=false&lt;BR /&gt;hits=2163800, user_data=0xac7201b0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xac5531c0, priority=12, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=1263350, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,Outside) tcp 102.36.145.8 6443 10.40.129.212 6443 netmask 255.255.255.255&lt;BR /&gt;match tcp DMZ host 10.40.129.212 eq 6443 Outside any&lt;BR /&gt;static translation to 102.36.145.8/6443&lt;BR /&gt;translate_hits = 1887, untranslate_hits = 455875&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xaba9d7c8, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt;hits=465138, user_data=0xaba9d330, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;dst ip=10.40.129.212, mask=255.255.255.255, port=6443, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,Outside) tcp 102.36.145.8 6443 10.40.129.212 6443 netmask 255.255.255.255&lt;BR /&gt;match tcp DMZ host 10.40.129.212 eq 6443 Outside any&lt;BR /&gt;static translation to 102.36.145.8/6443&lt;BR /&gt;translate_hits = 1887, untranslate_hits = 455880&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xaba9d970, priority=5, domain=host, deny=false&lt;BR /&gt;hits=697255, user_data=0xaba9d330, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip=10.40.129.212, mask=255.255.255.255, port=0&lt;BR /&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xab8645f0, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;hits=13250111, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 13696903, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 14:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856314#M1101703</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-16T14:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856362#M1101707</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I test by my self and this packet tracer from my lab&lt;BR /&gt;packet tracer input OUTSIDE tcp &amp;lt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;select any IP from the outside subnet&lt;/STRONG&gt;&lt;/FONT&gt;&amp;gt; 1234 &amp;lt;mapped IP of server&amp;gt; 7412&amp;nbsp;detail&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;select any IP from the outside subnet &amp;lt;&amp;lt;- the IP must not be ASA IP interface, if you use ASA IP use other and share the packter tracer&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input OUT tcp 100.0.0.100 1234 100.0.0.50 23 detailed&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (IN,OUT) source static telnet-ip telnet-map&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface IN&lt;BR /&gt;Untranslate 100.0.0.50/23 to 10.0.0.50/23&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group telnet in interface OUT&lt;BR /&gt;access-list telnet extended permit tcp any host 10.0.0.50 eq telnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08d9b6e30, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=0, user_data=0x7fe086496d00, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.0.0.50, mask=255.255.255.255, port=23, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUT, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (IN,OUT) source static telnet-ip telnet-map&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 100.0.0.100/1234 to 100.0.0.100/1234&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08d9b5fd0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x7fe08d9b4de0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=100.0.0.50, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUT, output_ifc=IN&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08d5df380, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;hits=2, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08d93d540, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUT, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08da6bcc0, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=1, user_data=0x7fe08d80e660, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08d9e4ec0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=1, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUT, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (IN,OUT) source static telnet-ip telnet-map&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7fe08d9b6400, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x7fe08d9b4ce0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.0.0.50, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUT, output_ifc=IN&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08da6bcc0, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=2, user_data=0x7fe08d80e660, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08d5df380, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;hits=4, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fe08d9a91c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=3, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=IN, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUT&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: IN&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 15:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856362#M1101707</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-16T15:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA Firewall NAT services not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856372#M1101709</link>
      <description>&lt;P&gt;NBS-BT-INTERNET-ASA5525# packet-tracer input OUTSIDE tcp 102.36.145.100 1234 1$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.36.145.13 service tcp_7412 tcp_7412&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE&lt;BR /&gt;Untranslate 102.36.145.13/7412 to 10.40.129.50/7412&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE in interface OUTSIDE&lt;BR /&gt;access-list OUTSIDE remark AMEYO CALL CENTER&lt;BR /&gt;access-list OUTSIDE extended permit tcp any object AMEYO_SERVER object-group AMEYO_PORTS&lt;BR /&gt;object-group service AMEYO_PORTS tcp&lt;BR /&gt;port-object eq 7412&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 8080&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc41fc50, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=0, user_data=0x7f5cd13b2740, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.40.129.50, mask=255.255.255.255, port=7412, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.36.145.13 service tcp_7412 tcp_7412&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 102.36.145.100/1234 to 102.36.145.100/1234&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc6789c0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x7f5cdc6779b0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=102.36.145.13, mask=255.255.255.255, port=7412, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=INSIDE&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdb5891a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93852, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc439a80, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=69568, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdeccc400, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=9703, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static AMEYO_SERVER 102.36.145.13 service tcp_7412 tcp_7412&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7f5cdc678da0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x7f5cdc670270, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.40.129.50, mask=255.255.255.255, port=7412, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=OUTSIDE, output_ifc=INSIDE&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdb5891a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=93854, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f5cdc3d1ba0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=66129, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 73637, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found next-hop 10.40.139.81 using egress ifc INSIDE&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found adjacency entry for Next-hop 10.40.139.81 on interface INSIDE&lt;BR /&gt;Adjacency :Active&lt;BR /&gt;MAC address 0000.0c07.ac82 hits 10478 reference 2&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 15:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firewall-nat-services-not-working/m-p/4856372#M1101709</guid>
      <dc:creator>vitumbiko nkhwazi</dc:creator>
      <dc:date>2023-06-16T15:33:43Z</dc:date>
    </item>
  </channel>
</rss>

