<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: nat-control deprecated; any equivalent? (moved here) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4910159#M1103706</link>
    <description>&lt;P&gt;Ahhh. Wow. Well, I figured it would be obvious in retrospect... I thought about that when first setting up the address ranges for each interface, then forgot it again.&lt;BR /&gt;&lt;BR /&gt;So the question is,&amp;nbsp; where the heck is that /16 coming from? According to ASDM, all the interfaces have masks of&amp;nbsp; 255.255.255.0. I sorta expected that to be passed down as part of dhcp. Unless someone was clever and assumed that 172. private addresses were by definition a /16 space and is setting that locally in the Pi. My fault for trying to be fancy and use something other than the 192.168 range, I suppose.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My options seem to be:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Resolve why we're getting a subnet mask other than I intended, and fix that.&lt;/LI&gt;&lt;LI&gt;Go back to 192.168 address range, where /24 is the assumption, and hope the subnet masks suddenly become /24 as well.&lt;/LI&gt;&lt;LI&gt;Separate the interface address ranges in the second octet rather than the third, so /16 is correct. Since the public range is 172.16 to 172.31, I'd need to encode my current "address indicates interface number", moving to something like 17.20, 17.21, 17.22, 17.23, and something vaguely appropriate for the Management interface. This might be a least-change solution if (1) is not possible.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Am I still missing anything? Other than whether the subnet mask can be fixed, that is?&lt;/P&gt;</description>
    <pubDate>Tue, 22 Aug 2023 20:12:17 GMT</pubDate>
    <dc:creator>Loxmyth</dc:creator>
    <dc:date>2023-08-22T20:12:17Z</dc:date>
    <item>
      <title>Problems running ASA5510 as 172.x.y.z (final resolution: subnet masks)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907577#M1103549</link>
      <description>&lt;P&gt;On my 5510, NAT rules appear to be needed for successful communication between interfaces at different security levels.&lt;BR /&gt;On Ricky's 5540, the security levels alone are sufficient to control flow between these; no NAT rules are required.&lt;BR /&gt;&lt;BR /&gt;I'd say that was the result of &lt;STRONG&gt;nat-control&lt;/STRONG&gt; being set differently on the two boxes, except that we're both running firmware versions after &lt;STRONG&gt;nat-control&lt;/STRONG&gt; was deprecated.&lt;/P&gt;&lt;P&gt;So... Is there a command that has equivalent effect, that we might have set differently on the two boxes without noticing it in the .cfg dumps? Or might that control still be there but invisible and inaccessible, so our two machines are unavoidably going to behave differently?&lt;BR /&gt;&lt;BR /&gt;(We've been beating our heads against this for the past week, trying to find the point of divergence between our setups. This looks suspiciously likely.)&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 04:09:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907577#M1103549</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-24T04:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907652#M1103563</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1082510"&gt;@Loxmyth&lt;/a&gt;, "nat-control" was deprecated and removed in version 8.3 when NAT code was completely re-written. There is no hidden equivalent or something like this. So, if NAT or PAT is not configured, proper ACLs are configured and routing is configured properly, traffic will pass between interfaces with different security levels in both directions subject to ACLs.&lt;/P&gt;&lt;P&gt;If NAT or PAT is configured (e.g. for subset of interfaces or traffic), things become more complicated. E.g. there is a feature "NAT RPF check" which can prevent communications depending on the NAT type being used (twice vs. manual) and software version. In such cases "packet-tracer" can help with troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 08:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907652#M1103563</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-08-18T08:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907951#M1103584</link>
      <description>&lt;P&gt;Thanks. What I can't figure out is why I'm having such trouble getting a basic "just keep lower security from opening connections to higher security, without explicit NAT" configuration going (and why it's working for Ricky). I'm starting to suspect that my error might not be in the .conf file but in something else.&lt;BR /&gt;&lt;BR /&gt;Unfortunately I haven't found a good example of that minimal configuration in any of the docs or websites I've checked. I'd actually have expected it to be the default behavior of the box, but if so I haven't been able to find my way back to it.&lt;/P&gt;&lt;P&gt;Could I ask a HUGE favor, and ask you to take a look at my configuration and see if you can spot what I've botched?&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;(Quoting Frances Sternhagen as Dr. Marian Lazarus in &lt;STRONG&gt;Outland&lt;/STRONG&gt;: "Such a smart piece of equipment, and a wreck like me trying to run it...")&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 16:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907951#M1103584</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-18T16:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907971#M1103585</link>
      <description>&lt;P&gt;Are you asking about outside to inside access or inside to outside or dmz to public, etc?&lt;/P&gt;&lt;PRE&gt;nat (any,public) source dynamic any interface&lt;BR /&gt;nat (any,outside) source dynamic any interface dns&lt;BR /&gt;nat (any,DMZ) source dynamic any interface&lt;BR /&gt;nat (any,inside) source dynamic any interface&lt;/PRE&gt;&lt;P&gt;For example, if you remove "nat (any,DMZ) source dynamic any interface" you should still be able to access DMZ 172.17.2.x from inside 172.17.1.y (higher security level to lower security level). To access inside from DMZ you need to permit traffic with ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 17:01:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4907971#M1103585</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-08-18T17:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908019#M1103590</link>
      <description>&lt;P&gt;That's what I would have expected. But that isn't what I'm seeing.&lt;BR /&gt;With these NAT rules in place, I can ping or ssh from machines on inside to public (172.17.1.102 to 172.17.3.20).&lt;BR /&gt;If I use ASDM to delete the rule for public&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Loxmyth_0-1692378746502.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/194724i49346E77C641F3BB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Loxmyth_0-1692378746502.png" alt="Loxmyth_0-1692378746502.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;ASDM sends the commands&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no nat 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; clear xlate global 172.17.3.0 netmask 255.255.255.0&lt;BR /&gt;and I can no longer ping or ssh to anything on the ..3.0 subnet from machines on either inside (..1.102) or management (..17.100).&lt;BR /&gt;&lt;BR /&gt;It isn't 100% clear whether the problem is that packets aren't getting out, packets aren't coming back, or somehow the target machines are themselves not accepting traffic from anything outside their own 255.255.255.0 masked range. If the latter, it might be that something is wrong with what dhcp is pushing out to them...&lt;BR /&gt;&lt;BR /&gt;I haven't yet put wireshark on this.&lt;BR /&gt;ASDM traceroute from inside (or 172.17.1.1)&amp;nbsp; to 172.17.3.20 without the NAT rule times out.&lt;BR /&gt;ASDM tcp ping from inside&amp;nbsp; to 172.17.3.20 without the NAT rule succeeds&lt;BR /&gt;ASDM tcp ping from inside/172.17.1.102&amp;nbsp; to 172.17.3.20 without the NAT rule times out&lt;BR /&gt;ASDM icmp ping from inside to 172.17.3.20 without the NAT rule times out&lt;BR /&gt;ASDM traceroute from inside to 172.17.3.20 without the NAT rule times out&lt;BR /&gt;ASDM use-icmp traceroute from inside to 172.17.3.20 without the NAT rule times out&lt;/P&gt;&lt;P&gt;If I restore the NAT rule, communication down to public is permitted again.&lt;/P&gt;&lt;P&gt;It really seems to want the explicit NAT. I don't understand why, since everyone agrees that higher-to-lower-security connection is supposed to Just Work.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 17:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908019#M1103590</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-18T17:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908404#M1103610</link>
      <description>&lt;P&gt;Is this a lab setup?&amp;nbsp; Also, you mention the following:&lt;/P&gt;
&lt;P&gt;Have you run a packet-tracer when you have removed the NAT rule?&amp;nbsp; What are the results?&lt;/P&gt;
&lt;P&gt;You could also run a capture on the public interface and inside interface simultaneously to see if you see traffic in both direction.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 09:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908404#M1103610</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-08-20T09:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908457#M1103617</link>
      <description>&lt;P&gt;Lab is a decent description. I can run experiments without seriously disrupting anyone's work.&lt;/P&gt;&lt;P&gt;Packet tracing: Let's see. With NAT disabled on public, using a host that I know is up:&lt;/P&gt;&lt;P&gt;ASDM traceroute to .3.20 without specifying source works, of course.&lt;BR /&gt;Setting source inside times out.&lt;BR /&gt;Setting source .1.1 (inside's address) times out.&lt;BR /&gt;Adding use-icmp still times out.&lt;/P&gt;&lt;P&gt;Windows tracert from .1.102 to .3.20: All * * * Request timed out.&lt;BR /&gt;Linux traceroute from .1.110: All * * *&lt;/P&gt;&lt;P&gt;Haven't used the capture feature before; I'll try it.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 14:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908457#M1103617</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-20T14:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908462#M1103618</link>
      <description>&lt;P&gt;ADSM packet tracer: I'm not 100% sure I'm grokking what this is telling me, but:&lt;BR /&gt;&lt;BR /&gt;Tracing from Interface inside, type ip, from .1.102 to .3.20, with no NAT on public, everything is ok until&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT rpf-check, action DROP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Config: nat(any,inside) source dynamic any interface&lt;BR /&gt;There shouldn't be any _outgoing_ NAT from inside to outside... should there?&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input Interface: inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Output Interface: public&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Info: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;If I set Interface: public,&amp;nbsp; otherwise same parameters (which I think simulates what would happen if the packet was just being transferred from inside to public?), all actions are OK and the packet is allowed.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 15:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908462#M1103618</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-20T15:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908464#M1103620</link>
      <description>&lt;P&gt;Yeah, that NAT statement there, nat(any,inside) source dynamic any interface, is your issue.&amp;nbsp; Remove this and you should be good to go.&amp;nbsp; Also, I highly recommend not using any as the source interface, use specific interface names. Use as specific NAT rules as possible and you will&amp;nbsp; not run into these types of issues in the future.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 15:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908464#M1103620</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-08-20T15:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908466#M1103621</link>
      <description>&lt;P&gt;But without NAT on inside, I can't ping inside from management...?&lt;BR /&gt;&lt;BR /&gt;Remember, the real problem here is that if I disable all the NAT rules, tcp is failing to make any connections... despite the intended behavior in that case being that things on higher security interfaces can talk to things on lower security interfaces. I can't even http out to the net unless there's a NAT rule for outside. (And wasn't NAT supposed to be protocol-aware so any tcp exchange that went through NAT got its responses converted back?)&lt;BR /&gt;&lt;BR /&gt;I absolutely agree that for my simple case I shouldn't need or be using NAT at all. But it's the only way I've found to make things work vaguely as expected. Goal of this discussion was to figure out why that root problem exists on my box and fix it.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 16:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908466#M1103621</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-20T16:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908470#M1103622</link>
      <description>&lt;P&gt;In other words, the configuration attached hereto (same as above but delete all the NATs) does _not_ work on my 5510. And I don't know why not. I've been told that when my config was loaded onto a 5540 it did work without NATs, but I'm not sure we're at exactly the same firmware level.&lt;BR /&gt;&lt;BR /&gt;I'm sure it's something obvious to someone who really understands the ASA. I grok many of the individual pieces but clearly not their interaction.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 16:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908470#M1103622</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-20T16:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908488#M1103623</link>
      <description>&lt;P&gt;What type of devices are you pinging towards on the Public network? Are you sure that this is not a routing issue on those devices?&lt;/P&gt;
&lt;P&gt;I highly suggest you do a packet capture on both the inside and public interfaces and then compare the two.&amp;nbsp; If you see packets entering the inside interface, leaving the public interface, but not getting anything in return there is an issue between the public interface and the device you are trying to connect to.&amp;nbsp; Keep in mind that the capture needs to be set up with the IPs you expect to see.&amp;nbsp; So if you have NAT configured then on the inside interface you would configure the real source IP and real destination IP, but on the public interface you would configure the translated source IP and the real destination IP.&lt;/P&gt;
&lt;P&gt;If you do not have NAT configured when testing you would just use the real IPs for both source and destination on both inside and public interfaces.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;But without NAT on inside, I can't ping inside from management...?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You do not need NAT for communication between RFC 1918 IPs, you do need NAT for communication to public IPs from private IPs.&amp;nbsp; So removing the NAT should not affect communication between networks connected or routed through the ASA.&amp;nbsp; However you will not be able to connected to an ASA interface that is not the ingress interface.&amp;nbsp; That is to say you cannot connected to the management interface from a device located on the inside network if that traffic passes through the ASA.&amp;nbsp; The only way this will be allowed is if the management traffic does not pass through the ASA to reach the management interface.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 19:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908488#M1103623</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-08-20T19:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908497#M1103624</link>
      <description>&lt;P&gt;The devices on Public I'm pinging most often are Raspberry Pis running Raspbian linux. It's certainly possible they're misconfigured and didn't expect to talk to anyone outside their own LAN's address range.&lt;BR /&gt;&lt;BR /&gt;Just tried pinging a different device on public, laptop running antiX linux. With NAT, ping succeeds. With the NAT rule for public disabled, ping fails. Again, it's possible that this laptop Linux is unwilling to listen to anything outside its own LAN, but it's another datapoint.&lt;BR /&gt;&lt;BR /&gt;I can try reversing things, put that laptop on Inside and my working machine on public, and see if that changes matters. Of the two I'd expect Windows to have more problems in networking than Linux, but...&lt;BR /&gt;&lt;BR /&gt;Lemme see if I can figure out packet capture, and I'll try that without NAT.&lt;BR /&gt;&lt;BR /&gt;Yes, understand about connectivity. That's why I currently have the ASA permitting access on both the internal and management interfaces; I'm hardwired to one or the other of those, and I try not to alter both at once so I've got a reliable alternative route.&lt;BR /&gt;&lt;BR /&gt;We all agree that I _shouldn't_ need NAT in this setup. It's certainly possible that the ASA is not at fault. The traceroute results specifically report "(acl-drop) Flow is denied by configured rule", but that may not imply a rule in the ASA's acl.&lt;/P&gt;&lt;P&gt;Lemme see if I can figure out packet capture, and I'll try that without NAT.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 20:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908497#M1103624</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-20T20:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908504#M1103626</link>
      <description>&lt;P&gt;I was going to say that the problem with the theory that it's the hosts that are misbehaving is that, in that case, I'm not sure why I need NAT to communicate with the WAN-facing outside. ... Oh. Maybe.&lt;/P&gt;&lt;P&gt;The ASA is plugged into a FIOS ONT (optical fiber). It's not impossible that this is blocking traffic from address ranges other than the one it assigned the via DHCP. That would require the translation from my 172.17 space, just as basic routers (I believe) run NAT to connect their 192.168 addresses to the ISP.&lt;BR /&gt;&lt;BR /&gt;So that one NAT rule, and only that one, would make sense. Yes?&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;BTW, packet capture is starting to -- finally, maybe -- convince me that the problem is in the leaf machines rather than in the ASA.&lt;/P&gt;&lt;P&gt;Question: The interface configuration, when I set the interface address, insists that the subnet mask be 255.255.255.0 when the interface is placed at .x.1. My understanding was that this meant if 172.17.1.x was talking to 172.17.3.y, the packet needed to cross the firewall since they're separate subnets, otherwise the firewall could completely ignore that packet. If so, how would I express a /16 address range (all of 172.17) when setting the interface address?&lt;BR /&gt;&lt;BR /&gt;Should I have done that (however it's done) as a single set of addresses shared by all interfaces, and used the third octet more as a comment indicating which physical subnet the device was on, rather than assigning each interface its own /24 address? I thought ASDM was keeping me from going that direction...&lt;/P&gt;</description>
      <pubDate>Sun, 20 Aug 2023 21:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908504#M1103626</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-20T21:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908844#M1103636</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1082510"&gt;@Loxmyth&lt;/a&gt; . Answering few question here.&lt;/P&gt;&lt;P&gt;1. This is expected behavior of ASA NAT that it drops packets due to NAT RPF check when you remove NAT rule 1 and ping from inside to public:&lt;/P&gt;&lt;PRE&gt;nat (any,outside) source dynamic any interface dns&lt;BR /&gt;nat (any,DMZ) source dynamic any interface&lt;BR /&gt;nat (any,inside) source dynamic any interface&lt;/PRE&gt;&lt;P&gt;In this case "forward flow" matches none rules and "reverse flow" matches 3rd rule and ASA doesn't like it. But actually, this concept is not easy to explain taking into consideration that ASA is a stateful firewall (why should "forward" and "reverse" flows be separated?). Also, IOS routers don't have anything like this at all. The reason behind "NAT RPF check" is how ACLs work on ASA. For example, when you allow traffic from outside to internal Web server, you specify real-IP (private IP) of the server in the outside ACL, rather than its public IP. Even if you make an error and permit whole subnet range, NAT RPF check will prevent communications from outside to inside:&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source dynamic any interfacenat (inside,outside) source static obj-10.1.1.1 interface service obj-tcp-src-443 obj-tcp-src-4443access-list outside_in permit tcp any 10.1.1.0 255.255.255.0 eq 443access-group outside_in in interface outside&lt;/PRE&gt;&lt;P&gt;So, NAT RPF check is a security mechanism (sort of).&lt;/P&gt;&lt;P&gt;2. Yes, typically NAT is needed to access outside to translate private space to addresses which upstream devices understand and have routing to. You can check what IP address is assigned to your outside interface with "show int ip brief". You should see default route assigned by DHCP too. Single rule should work just fine:&lt;/P&gt;&lt;PRE&gt;nat (any,outside) source dynamic any interface dns&lt;/PRE&gt;&lt;P&gt;Traffic between other interfaces, e.g. inside to public or public to inside won't be NATed and everything should work if devices have proper routing configured via ASA.&lt;/P&gt;&lt;P&gt;3. Packet capture can be used from CLI (also packet-tracer tool), e.g.&lt;/P&gt;&lt;PRE&gt;capture cap-in interface inside match tcp host 10.1.1.1 host 192.0.2.10 eq 23capture cap-out interface outside match tcp host 10.1.1.1 host 192.0.2.10 eq 23&lt;BR /&gt;show capture cap-inshow capture cap-out&lt;/PRE&gt;&lt;P&gt;Capture is bi-directional.&lt;/P&gt;&lt;P&gt;4. In routed firewall mode ASA won't allow you configure overlapping address spaces. It will complain "two interfaces cannot be on the same subnet".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 08:39:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4908844#M1103636</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-08-21T08:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909282#M1103659</link>
      <description>&lt;P&gt;The goal is to use the interface security levels but otherwise permit all traffic (with required NAT to outside). It sounds like NAT RPF Check is what's getting in the way with the current setup -- true?&lt;BR /&gt;&lt;BR /&gt;If so, what's the fix? Do I need to go to transparent mode, set all the interfaces as&amp;nbsp; 172.17.0.1 255.255.0.0, and tell DHCP that each interface allocates addresses out of a separate subpool just so DHCP-provided addresses include the indication of what interface they're connected to? This seems rather different from the "plug it in, set security levels and address ranges, and due to statefulness everything should just work" that people keep telling me.&lt;BR /&gt;&lt;BR /&gt;Or am I still confused?&lt;/P&gt;&lt;P&gt;I would expect this to be one of the most common starting configurations for the ASA, but there doesn't seem to be a worked example on the Web. Surprising.&lt;BR /&gt;&lt;BR /&gt;(Yes, I know everything -- and maybe more things -- that can be done through ASDM can be done from the command line. I had to play with that until I get enough of the (used) machine reset and configured to connect ASDM to it at all. But if it CAN be done in the GUI tool, that's easier for this novice. Assuming I can figure out where the GUI hides that control and what the interactions are.)&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 21:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909282#M1103659</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-21T21:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909323#M1103661</link>
      <description>&lt;P&gt;When packet-tracer complains about RPF drop it is usually either due to a routing issue or a wrong packet-tracer syntax.&amp;nbsp; Try running the following and post the complete output here.&amp;nbsp; run it once with nat present and then once again without nat, save them into separate files and post the files here.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 172.17.1.10 12345 172.17.3.10 443 detail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Is there a reason you have ipv6 enabled on the interfaces?&amp;nbsp; I would suggest that until the issue is identified, remove any configuration that is not really necessary, including the ipv6 configuration.&lt;/P&gt;
&lt;P&gt;Also, would be good if you could perform a capture on the interfaces in question while you run a tes connection. Also, post the results here.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cap capin interface inside match ip any host &amp;lt;IP of destination 172.17.3.x&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cap cappub interface public match ip any&amp;nbsp;host &amp;lt;IP of destination 172.17.3.x&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show cap capin&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show cap cappub&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 22:21:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909323#M1103661</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-08-21T22:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909379#M1103668</link>
      <description>&lt;P&gt;OK, lemme turn off IPv6.&lt;BR /&gt;&lt;BR /&gt;With NAT rules enabled:&lt;/P&gt;&lt;PRE&gt;Result of the command: "packet-tracer input inside tcp 172.17.1.10 12345 172.17.3.10 443 detail"&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xad5a1d68, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=2205239, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 172.17.3.0 255.255.255.0 public&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,public) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 172.17.1.10/12345 to 172.17.3.1/12345&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xadb5b178, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=90697, user_data=0xae516000, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=public&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xacdf5310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=291569, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xad5a8a00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=174474, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,inside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xadc0c318, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=54277, user_data=0xacce2620, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xacdf5310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=291571, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xad5fd500, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=153627, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=public, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 348386, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: public&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/PRE&gt;&lt;P&gt;With NAT rules disabled (except for the one on outside):&lt;/P&gt;&lt;PRE&gt;Result of the command: "packet-tracer input inside tcp 172.17.1.10 12345 172.17.3.10 443 detail"&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 172.17.3.0 255.255.255.0 public&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xacdf5310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=292499, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xad5a8a00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=174830, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xacdf5310, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=292501, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xad5fd500, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=153821, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=public, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 348997, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: public&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/PRE&gt;&lt;P&gt;Still with NAT rules disabled (except Outside), captures of &lt;STRONG&gt;ping -n 3 172.17.3.20&lt;/STRONG&gt; followed by &lt;STRONG&gt;ssh 172.17.3.20&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;Result of the command: "cap capin interface inside match ip any host 172.17.3.20"&lt;BR /&gt;&lt;BR /&gt;The command has been sent to the device&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Result of the command: "cap cappub interface public match ip any host 172.17.3.20"&lt;BR /&gt;&lt;BR /&gt;The command has been sent to the device&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Result of the command: "show cap capin"&lt;BR /&gt;&lt;BR /&gt;12 packets captured&lt;BR /&gt;&lt;BR /&gt;1: 21:29:03.627531 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;2: 21:29:08.346692 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;3: 21:29:13.347180 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;4: 21:29:18.354199 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;5: 21:33:16.400080 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;6: 21:33:21.340833 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;7: 21:33:26.340070 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;8: 21:33:47.977259 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 2531197003:2531197003(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;9: 21:33:48.985498 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 2531197003:2531197003(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;10: 21:33:50.992151 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 2531197003:2531197003(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;11: 21:33:55.002242 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 2531197003:2531197003(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;12: 21:34:03.009612 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 2531197003:2531197003(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;12 packets shown&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Result of the command: "show cap cappub"&lt;BR /&gt;&lt;BR /&gt;15 packets captured&lt;BR /&gt;&lt;BR /&gt;1: 21:29:03.627698 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;2: 21:29:08.346860 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;3: 21:29:13.347363 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;4: 21:29:18.354367 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;5: 21:33:16.400232 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;6: 21:33:21.341001 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;7: 21:33:26.340238 172.17.1.101 &amp;gt; 172.17.3.20: icmp: echo request &lt;BR /&gt;8: 21:33:47.977442 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 4184713546:4184713546(0) win 64240 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;9: 21:33:48.985559 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 4184713546:4184713546(0) win 64240 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;10: 21:33:50.992212 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 4184713546:4184713546(0) win 64240 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;11: 21:33:55.002288 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 4184713546:4184713546(0) win 64240 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;12: 21:34:03.009658 172.17.1.101.48987 &amp;gt; 172.17.3.20.22: S 4184713546:4184713546(0) win 64240 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;13: 21:34:33.803867 172.17.3.20 &amp;gt; 224.0.0.251: ip-proto-2, length 8 &lt;BR /&gt;14: 21:34:35.324842 172.17.3.20 &amp;gt; 224.0.0.251: ip-proto-2, length 8 &lt;BR /&gt;15: 21:34:40.048871 172.17.3.20 &amp;gt; 224.0.0.251: ip-proto-2, length 8 &lt;BR /&gt;15 packets shown&lt;/PRE&gt;&lt;P&gt;Of course with the NAT rules disabled, my console response on .1.101 was as follows. (Local .hosts file mapping meetpoint to .3.20)&lt;/P&gt;&lt;PRE&gt;C:\Users\keshlam\&amp;gt;ping -n 3 172.17.3.20&lt;BR /&gt;&lt;BR /&gt;Pinging 172.17.3.20 with 32 bytes of data:&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;&lt;BR /&gt;Ping statistics for 172.17.3.20:&lt;BR /&gt;Packets: Sent = 3, Received = 0, Lost = 3 (100% loss),&lt;BR /&gt;&lt;BR /&gt;C:\Users\keshlam&amp;gt;ssh meetpoint&lt;BR /&gt;ssh: connect to host meetpoint port 22: Connection timed out&lt;BR /&gt;&lt;BR /&gt;C:\Users\keshlam&amp;gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;MANY thanks, once again, to everyone who has been willing to look at this!&lt;BR /&gt;&lt;BR /&gt;Any suggestions where I should post a usage tip based on my misunderstanding, once we find it, would be welcome; I'm not currently running a blog of my own. Or if you're planning to write it up, let me know where so I can point folks to it.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 01:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909379#M1103668</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-22T01:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909383#M1103669</link>
      <description>&lt;P&gt;Possibly dumb question: The default Access Rules permit &lt;STRONG&gt;ip&lt;/STRONG&gt;. I have been presuming that this was a convenience setting which implied &lt;STRONG&gt;tcp&lt;/STRONG&gt;, and &lt;STRONG&gt;tcp&lt;/STRONG&gt; implied all the individual protocols built on &lt;STRONG&gt;tcp&lt;/STRONG&gt;. (I'm not clear on whether or not it implies &lt;STRONG&gt;icmp&lt;/STRONG&gt;.) Certainly the outgoing packets have seemed to behave that way. But... could not having explicitly specified (for example) &lt;STRONG&gt;ssh&lt;/STRONG&gt; be causing us not to have stateful processing of that transaction? Or does &lt;STRONG&gt;ip&lt;/STRONG&gt; really mean stateless &lt;STRONG&gt;ip&lt;/STRONG&gt;, with my having to explicitly include &lt;STRONG&gt;tcp&lt;/STRONG&gt; (or all the individual protocols?) if I want the firewall to handle sessions correctly?&lt;BR /&gt;&lt;BR /&gt;(I've also been presuming this because user-entered rules don't offer the option of "any less secure", and don't let me select multiple interfaces so I can't do this manually. And since I'm not sure I know what network I'm going to be assigned when outside picks up the ONT's DHCP info, I can't use the address-ranges version to do this as a single access rule either.)&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 03:59:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909383#M1103669</guid>
      <dc:creator>Loxmyth</dc:creator>
      <dc:date>2023-08-22T03:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: nat-control deprecated; any equivalent? (moved here)</title>
      <link>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909424#M1103676</link>
      <description>&lt;P&gt;Higher to lower security levels implies IP, and we do see that icmp is entering the ASA inside interface and leaving the Public interface.&amp;nbsp; But we are not seeing anything in return.&amp;nbsp; Since ICMP is stateless, you need the command inspect icmp in your policy-map global-policy to allow the return ICMP traffic which you do have in place.&amp;nbsp; This leads me to believe that the issue is either on the destination host or the network between the destination host and the ASA.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you able to ping the ASA 172.17.3.1 interface from 172.17.3.20 device?&lt;/P&gt;
&lt;P&gt;can you verify the IP, subnet, and default gateway on the 172.17.3.20 device?&lt;/P&gt;
&lt;P&gt;Do you by chance have a local firewall enabled on the 172.17.3.20 device?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 05:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-running-asa5510-as-172-x-y-z-final-resolution-subnet/m-p/4909424#M1103676</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-08-22T05:44:08Z</dc:date>
    </item>
  </channel>
</rss>

