<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Web Application Server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5082085#M1111823</link>
    <description>I think my issue is that ACL prefers the outside instead of the&lt;BR /&gt;inside interface, DMZ.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;packet-tracer input DMZ tcp 172.16.10.70 443 192.168.50.11$&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,outside) source static dmz_subnet dmz_subnet destination static&lt;BR /&gt;INSIDE_network INSIDE_network&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 192.168.50.114/443 to 192.168.50.114/443&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz_access_in in interface DMZ&lt;BR /&gt;access-list dmz_access_in extended permit ip object Water_Gateway object&lt;BR /&gt;INSIDE_network&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ, outside) source static dmz_subnet dmz_subnet destination static&lt;BR /&gt;INSIDE_network INSIDE_network&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.10.70/443 to 172.16.10.70/443&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,outside) source static dmz_subnet dmz_subnet destination static&lt;BR /&gt;INSIDE_network INSIDE_network&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 4891534, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;(config)# show run policy-map&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 29 Apr 2024 12:08:28 GMT</pubDate>
    <dc:creator>dissai</dc:creator>
    <dc:date>2024-04-29T12:08:28Z</dc:date>
    <item>
      <title>Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079018#M1111624</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;I'm asking for you guidance. I have come across a challenge on Cisco ASA version 9.8. Need to allow a web server to be access outside(Public) from DMZ Zone to Ouside Zone.&amp;nbsp; Per below configuration template. Nat is transilating but access-list no hits which result that I can ping transilated IP from outside but I am not able to open application (to load a page). Kindly assist to receive the configuration and the packet tracer out form outside and DMZ leg shared.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 200.100.1.2 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.50.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 80&lt;BR /&gt;ip address 172.16.10.253 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network LAN&lt;BR /&gt;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt;object network ASDM&lt;BR /&gt;host 155.12.32.90&lt;BR /&gt;object network vpn_subnet&lt;BR /&gt;subnet 10.6.7.0 255.255.255.0&lt;BR /&gt;object network dmz_subnet&lt;BR /&gt;subnet 172.16.10.0 255.255.255.0&lt;BR /&gt;object network webserver-external-ip&lt;BR /&gt;host 200.100.1.2&lt;BR /&gt;object network web_server&lt;BR /&gt;host 172.16.10.50&lt;BR /&gt;object network MONITOR_SRV&lt;BR /&gt;host 192.168.50.114&lt;BR /&gt;object network SWITCH_HOST&lt;BR /&gt;host 192.168.50.2&lt;BR /&gt;object network OUTSIDE_INTERFACE&lt;BR /&gt;host 200.100.1.2&lt;BR /&gt;object network Water_Gateway_NAT&lt;BR /&gt;host 200.100.1.70&lt;BR /&gt;object network Water_Gateway&lt;BR /&gt;host 172.16.10.70&lt;BR /&gt;object-group network OBJ-SITE-ASA&lt;BR /&gt;network-object host 172.16.10.50&lt;/P&gt;&lt;P&gt;object-group network DMZ_SERVERS&lt;BR /&gt;network-object host 172.16.10.51&lt;BR /&gt;object-group network DMZ-Network&lt;BR /&gt;network-object 172.16.10.0 255.255.255.0&lt;BR /&gt;object-group network Outside-Network&lt;BR /&gt;network-object 200.100.1.0 255.255.255.0&lt;BR /&gt;object-group network NETWORK_Devices&lt;BR /&gt;network-object host 192.168.50.1&lt;BR /&gt;network-object host 192.168.50.2&lt;BR /&gt;network-object host 192.168.50.114&lt;BR /&gt;object-group service DM_INLINE_TCP_0 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;access-list management_access_in extended permit ip any any&lt;BR /&gt;access-list management_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 object Water_Gateway object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq ssh&lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 32007&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 41.188.165.190 eq https&lt;BR /&gt;access-list outside_access_in extended permit icmp any4 any4&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Water_Gateway eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Water_Gateway eq https&lt;BR /&gt;access-list dmz_access_in extended permit tcp object Water_Gateway any eq https&lt;BR /&gt;access-list dmz_access_in extended permit tcp object Water_Gateway any eq www&lt;BR /&gt;access-list dmz_access_in extended deny ip any object LAN_network&lt;BR /&gt;access-list dmz_access_in extended permit ip any any&lt;BR /&gt;access-list ACL_MACOS standard permit host 192.168.50.114&lt;BR /&gt;access-list ACL_MACOS standard permit host 192.168.50.2&lt;BR /&gt;access-list ACL_MACOS standard permit host 192.168.50.1&lt;BR /&gt;access-list ACL_MACOS standard permit 172.16.10.0 255.255.255.0&lt;BR /&gt;access-list dmz_access_out extended permit icmp any any&lt;BR /&gt;access-list inside_access_in extended permit ip host 200.100.1.1 10.6.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-openjre-7202.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (INSIDE,outside) source dynamic LAN_network interface&lt;BR /&gt;nat (outside,any) source static ASDM ASDM destination static interface any&lt;BR /&gt;nat (outside,DMZ) source static vpn_subnet vpn_subnet destination static dmz_subnet dmz_subnet&lt;BR /&gt;nat (INSIDE,outside) source static NETWORK_Devices NETWORK_Devices destination static vpn_subnet vpn_subnet&lt;BR /&gt;nat (DMZ,outside) source static dmz_subnet dmz_subnet destination static LAN_network LAN_network&lt;BR /&gt;!&lt;BR /&gt;object network LAN_network&lt;BR /&gt;nat (INSIDE,outside) dynamic interface&lt;BR /&gt;object network dmz_subnet&lt;BR /&gt;nat (DMZ,outside) dynamic interface&lt;BR /&gt;object network web_server&lt;BR /&gt;nat (DMZ,outside) static 200.100.1.51&lt;BR /&gt;object network Water_Gateway&lt;BR /&gt;nat (DMZ,outside) static Water_Gateway_NAT&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface DMZ&lt;BR /&gt;access-group dmz_access_out out interface DMZ&lt;BR /&gt;access-group management_access_in in interface MGMT&lt;BR /&gt;route MGMT 0.0.0.0 0.0.0.0 172.16.5.2 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 200.100.1.1 1&lt;BR /&gt;route outside 10.6.7.0 255.255.255.0 200.100.1.1 1&lt;BR /&gt;route outside 200.100.1.51 255.255.255.255 200.100.1.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal VPN-TRANSFORM&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint REMOTE_VPN&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;t&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.10.04065-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.10.04065-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux64-4.10.08029-webdeploy-k9.pkg 3&lt;BR /&gt;anyconnect profiles profile_macos disk0:/anyconnect_profile.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-policy ASA-TO-FTD internal&lt;BR /&gt;group-policy ASA-TO-FTD attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2 l2tp-ipsec ssl-client&lt;BR /&gt;group-policy REMOTE_L2L_VPN internal&lt;BR /&gt;group-policy REMOTE_L2L_VPN attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value ACL_MACOS&lt;BR /&gt;default-domain value LAN.co.tz&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value profile_macos type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;tunnel-group REMOTE_VPN type remote-access&lt;BR /&gt;tunnel-group REMOTE_VPN general-attributes&lt;BR /&gt;address-pool VPN_POOL_MACOS&lt;BR /&gt;default-group-policy REMOTE_L2L_VPN&lt;BR /&gt;tunnel-group REMOTE_VPN webvpn-attributes&lt;BR /&gt;group-alias LAN_ONENET enable&lt;BR /&gt;tunnel-group LAN_DEVOPS type remote-access&lt;BR /&gt;tunnel-group LAN_DEVOPS webvpn-attributes&lt;BR /&gt;group-alias LAN_DEVOPS enable&lt;BR /&gt;!&lt;BR /&gt;——————————————————————————————————————————————&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# packet-tracer input outside tcp 5.5.5.5 1234 200.100.1.70 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,outside) source static Water_Gateway Water_Gateway_NAT&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate 200.100.1.70/80 to 172.16.10.70/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Water_Gateway eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,outside) source static Water_Gateway Water_Gateway_NAT&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 5.5.5.5/1234 to 5.5.5.5/1234&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;———————————————————————————————————————————————————————————&lt;/P&gt;&lt;P&gt;# packet-tracer input DMZ tcp 5.5.5.5 1234 200.100.1.70 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 200.100.1.1 using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz_access_in in interface DMZ&lt;BR /&gt;access-list dmz_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 3476841, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;&lt;BR /&gt;#&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 09:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079018#M1111624</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-26T09:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079110#M1111638</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1500030"&gt;@dissai&lt;/a&gt; is the configuration you provided accurate? The packet-tracer output references objects called "Momo_Gateway" but there is no mention of Momo_Gateway in your configuration. Please provide the full configuration.&lt;/P&gt;
&lt;P&gt;Re-run packet-tracer appended "detailed" at the end.&lt;/P&gt;
&lt;P&gt;Provide "show nat detail"&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 07:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079110#M1111638</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-26T07:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079121#M1111639</link>
      <description>&lt;P&gt;&lt;SPAN&gt;object network web_server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (DMZ,outside) static 200.100.1.51&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network Water_Gateway&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (DMZ,outside) static Water_Gateway_NAT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;this need to change to be&amp;nbsp;&lt;BR /&gt;nat(DMZ,outside) static object &amp;lt;real server IP&amp;gt; object &amp;lt;mapped server IP&amp;gt;&lt;BR /&gt;&lt;BR /&gt;do that and check again&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 07:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079121#M1111639</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T07:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079234#M1111650</link>
      <description>Hi Rob,&lt;BR /&gt;&lt;BR /&gt;ignore Momo, shared configuration is accurate.&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Apr 2024 09:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079234#M1111650</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-26T09:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079256#M1111652</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;The Cisco ASA version 9.8 no option for static object as you see below.&lt;/P&gt;&lt;P&gt;config-network-object)# nat (DMZ,outside) static ?&lt;/P&gt;&lt;P&gt;network-object mode commands/options:&lt;BR /&gt;A.B.C.D Mapped IP address&lt;BR /&gt;WORD Mapped network object/object-group name&lt;BR /&gt;X:X:X:X::X/&amp;lt;0-128&amp;gt; Enter an IPv6 prefix&lt;BR /&gt;interface Use interface address as mapped IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 10:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079256#M1111652</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-26T10:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079260#M1111653</link>
      <description>&lt;P&gt;config-network-object)# nat (DMZ,outside) static &amp;lt;name of object&amp;gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 10:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079260#M1111653</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T10:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079444#M1111662</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Still I'm getting same responce.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 12:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079444#M1111662</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-26T12:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079742#M1111680</link>
      <description>&lt;P&gt;show run nat&amp;nbsp;&lt;BR /&gt;do test again and share&amp;nbsp;&lt;BR /&gt;show conn &amp;lt;server IP&amp;gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 15:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079742#M1111680</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T15:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079863#M1111690</link>
      <description>&lt;P&gt;Firstly, is the public IP&amp;nbsp;200.100.1.70 you are using correct? the outside interface on your firewall has a /29 which means that the usable range of the IP addresses would be from&amp;nbsp;200.100.1.1 to&amp;nbsp;200.100.1.16, so .70 is out of that range. Or maybe you purchased additional range from the provider?&lt;/P&gt;
&lt;P&gt;The second thing I've noticed is the access list "dmz_access_out". This ACL is applied in outbound direction on the DMZ interface and it only has a single rule allowing ICMP traffic. This rule must allow the application traffic as well, so if you want to allow http and https then you would need to add them to that ACL. Probably this is why ping is working for you but not the application traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 17:04:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079863#M1111690</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-04-26T17:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079966#M1111696</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Below is the output.&lt;/P&gt;&lt;P&gt;(DMZ) to (outside) source static Water_Gateway Water_Gateway_NAT&lt;BR /&gt;translate_hits = 0, untranslate_hits = 65&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;show conn address 172.16.10.70&lt;BR /&gt;27 in use, 22405 most used&lt;/P&gt;&lt;P&gt;TCP outside 10.6.7.3:56233 DMZ 172.16.10.70:22, idle 0:00:59, bytes 13244, flags UIOB&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;packet-tracer input outside tcp 5.5.5.5 1234 200.100.1.70 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Water_Gateway&lt;BR /&gt;nat (DMZ,outside) static Water_Gateway_NAT&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate 200.100.1.70/80 to 172.16.10.70/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Water_Gateway eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 17:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5079966#M1111696</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-26T17:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080001#M1111702</link>
      <description>&lt;P&gt;Hello Aref,&lt;/P&gt;&lt;P&gt;I have added but still am having same result.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 18:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080001#M1111702</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-26T18:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080045#M1111703</link>
      <description>&lt;P&gt;it some long steps but It need to know the issue here (before each step try access to server) and (after each step show capture with it name)&lt;BR /&gt;1-capture CAP1 interface out match ip host &amp;lt;the server public IP&amp;gt;&lt;BR /&gt;2- capture asp-drop type asp-drop acl-drop&lt;BR /&gt;3- capture CAP2 interface DMZ match ip host &amp;lt;the server private IP&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;waiting you&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 19:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080045#M1111703</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T19:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080102#M1111705</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Below is output means no traffic detected.&lt;/P&gt;&lt;P&gt;FW(config)# show capture CAP1&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;BR /&gt;FW(config)#&lt;BR /&gt;FW(config)#&lt;BR /&gt;FW(config)# show capture CAP2&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;BR /&gt;FW(config)#&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 22:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080102#M1111705</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-26T22:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080105#M1111706</link>
      <description>&lt;P&gt;You use IP or FQDN of server when you test?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 22:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080105#M1111706</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T22:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080111#M1111707</link>
      <description>&lt;P&gt;Check your DNS server&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 00:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080111#M1111707</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-27T00:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080201#M1111711</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;I used Server IP.&lt;/P&gt;&lt;P&gt;Tell me on Cisco version 9.8. The nat rule&amp;nbsp; work when using object-group or network-group.I think is the area I'm facing issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 06:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080201#M1111711</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-27T06:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080210#M1111712</link>
      <description>&lt;P&gt;yes that can be but we must check traffic point by point&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NOW&lt;/P&gt;
&lt;P&gt;capture CAP1 interface OUT match ip host &amp;lt;the ip of PC you use for test&amp;gt;&lt;/P&gt;
&lt;P&gt;Do this capture one time using ping&amp;nbsp;&lt;/P&gt;
&lt;P&gt;other using access to web server&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share result here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for waiting&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 06:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080210#M1111712</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-27T06:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080493#M1111725</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Here is the ouput&lt;/P&gt;&lt;P&gt;capture CAP1 type raw-data interface outside [Capturing - 0 bytes]&lt;BR /&gt;match ip host&amp;nbsp; x.x.x.x&amp;nbsp; host &lt;SPAN&gt;200.100.1.70&lt;/SPAN&gt;&lt;BR /&gt;capture asp-drop type asp-drop acl-drop [Buffer Full - 524276 bytes]&lt;BR /&gt;capture CAP2 type raw-data interface DMZ [Capturing - 0 bytes]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 15:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080493#M1111725</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-27T15:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080499#M1111726</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (366).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216982i6CD564A642989E46/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (366).png" alt="Screenshot (366).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;this is your topolgy&amp;nbsp;&lt;BR /&gt;you want to access ServerPriv from the UserPublic?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 15:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080499#M1111726</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-27T15:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Server</title>
      <link>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080528#M1111727</link>
      <description>&lt;P&gt;Yes MHM.&lt;/P&gt;&lt;P&gt;I want to access the&amp;nbsp; ServerPriv from UserPublic using Translated IP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 16:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/web-application-server/m-p/5080528#M1111727</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-27T16:13:36Z</dc:date>
    </item>
  </channel>
</rss>

