<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with PAT Setup ASA 5508 9.16(1) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302496#M1121461</link>
    <description>&lt;P&gt;&lt;SPAN&gt;10.12.13.190 &amp;lt;&amp;lt;- this IP is IP of interface not real IP of Server&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 25 Jun 2025 15:41:59 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2025-06-25T15:41:59Z</dc:date>
    <item>
      <title>Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302174#M1121439</link>
      <description>&lt;P&gt;Trying to get a port forward setup for a server behind the firewall and having an issue getting it to work. The traffic appears to be dropping after touching the outside interface, even though an outside ACL is created for this traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the configuration line items:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/8&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 1.2.3.4 255.255.255.252&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/4&lt;BR /&gt;nameif DMZ3&lt;BR /&gt;security-level 40&lt;BR /&gt;ip address 10.12.13.190 255.255.255.0&lt;/P&gt;&lt;P&gt;object network server-1&lt;/P&gt;&lt;P&gt;host 10.12.13.200&lt;BR /&gt;nat (DMZ3,outside) static interface service tcp 51210 51210&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.12.13.200 eq 51210&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing something? All the docs I find on ASA 9 setup this appears to be all you need.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 15:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302174#M1121439</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-06-25T15:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302496#M1121461</link>
      <description>&lt;P&gt;&lt;SPAN&gt;10.12.13.190 &amp;lt;&amp;lt;- this IP is IP of interface not real IP of Server&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 15:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302496#M1121461</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-25T15:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302497#M1121462</link>
      <description>&lt;P&gt;Sorry, I was trying to obfuscate the IPs and messed up the addresses for the host and access-list. I fixed the config line items above. It should be 10.12.13.200. Even with this config it was not working.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 15:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302497#M1121462</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-06-25T15:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302500#M1121463</link>
      <description>&lt;P&gt;Can I see&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show run nat&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 16:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5302500#M1121463</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-25T16:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303046#M1121485</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Yes, here it is.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (DMZ2,outside) source dynamic WSUS interface&lt;BR /&gt;nat (DMZ2,outside) source dynamic AV_SVR interface&lt;BR /&gt;nat (InternetAccess,outside) source dynamic any interface&lt;BR /&gt;nat (DMZ1,outside) source static WebProxy WebProxy destination static NETWORK_OBJ_10.12.19.240_28 NETWORK_OBJ_10.12.19.240_28 no-proxy-arp route-lookup&lt;BR /&gt;nat (DMZ1,outside) source static NETWORK_OBJ_10.12.19.0_24 NETWORK_OBJ_10.12.19.0_24 destination static NETWORK_OBJ_10.12.19.240_28 NETWORK_OBJ_10.12.19.240_28 no-proxy-arp route-lookup&lt;BR /&gt;nat (DMZ1,outside) source dynamic WebProxy interface&lt;BR /&gt;!&lt;BR /&gt;object network NAT_Mob&lt;BR /&gt;nat (DMZ2,outside) dynamic interface&lt;BR /&gt;object network server-1&lt;BR /&gt;nat (DMZ3,outside) static interface service tcp 51210 51210&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2025 15:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303046#M1121485</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-06-26T15:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303068#M1121487</link>
      <description>&lt;P&gt;I need to see&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show nat&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not show run (appear NAT config)&lt;/P&gt;
&lt;P&gt;What I think is that the NAT order is issue here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is NAT above your request NAT which make traffic drop&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2025 15:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303068#M1121487</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-26T15:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303135#M1121488</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/eos-eol-notice-c51-744798.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/eos-eol-notice-c51-744798.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/asa-9-16-asav-asdm-release-7-16-eol.html#:~:text=Cisco%20announces%20the%20end%2Dof,)%20is%20November%2018%2C%202025" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/asa-9-16-asav-asdm-release-7-16-eol.html#:~:text=Cisco%20announces%20the%20end%2Dof,)%20is%20November%2018%2C%202025&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2025 16:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303135#M1121488</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-06-26T16:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303232#M1121491</link>
      <description>&lt;P&gt;Run packet tracer and share the output where it is dropping.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp &amp;lt;Source-ip from external&amp;gt; 1234 &amp;lt;Interface-IP-of-Firewall&amp;gt; 51210 share the output to understand what NAT is hitting.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show log | inc 10.12.13.200/&amp;lt;Source-ip from external&amp;gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This too helps understand what is happening.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 00:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303232#M1121491</guid>
      <dc:creator>swj</dc:creator>
      <dc:date>2025-06-27T00:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303526#M1121516</link>
      <description>&lt;P&gt;Thank you for all the responses. I have to schedule the time with the on-site contact, so it takes a little more time to gather the requested information.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 20:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5303526#M1121516</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-06-27T20:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5304837#M1121577</link>
      <description>&lt;P&gt;I can't see anything wrong with your config and based on the provided NAT rules configs there shouldn't be any other NAT rule that would match the traffic destined to host&amp;nbsp;&lt;SPAN&gt;10.12.13.200. In addtion to what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/44993"&gt;@swj&lt;/a&gt;&amp;nbsp;suggested, you could also run some packet capture on DMZ3 interface to see if there is any traffic leaving the firewall towards the host 10.12.13.200. You can also issue the command "show xlate" which should show you the NAT rules in use.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I personally suspect that the issue you are experiencing is on the server side, not on the firewall. Maybe the server has a local firewall turned on and it's not allowing the traffic destined to port 51210/tcp to pass through, or maybe the application that is using this port is down or is using a different port. If the server is running on Windows then you could use the command (netstat -an | find "51210") to check the listening ports, if Linux I think it's (netstat -lnt).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Here is an example of how to run packet capture on the ASA:&lt;/P&gt;
&lt;P&gt;capture VDZPRO interface real-time DMZ3 match tcp any host 10.12.13.200 eq 51210&lt;/P&gt;
&lt;P&gt;This will show you the capture in real time. Just remember please to stop and delete the capture once you finish with the command "no capture VDZPRO".&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 11:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5304837#M1121577</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-02T11:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307534#M1121717</link>
      <description>&lt;P&gt;Here is the show nat:&lt;/P&gt;&lt;P&gt;Manual NAT Policies Implicit (Section 0)&lt;BR /&gt;1 (nlp_int_tap) to (outside) source dynamic nlp_client_0_0.0.0.0_17proto53_intf6 interface destination static nlp_client_0_ipv4_2 nlp_client_0_ipv4_2 service nlp_client_0_17svc53_1 nlp_client_0_17svc53_1&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (nlp_int_tap) to (outside) source dynamic nlp_client_0_ipv6_::_17proto53_intf6 interface ipv6 destination static nlp_client_0_ipv6_4 nlp_client_0_ipv6_4 service nlp_client_0_17svc53_3 nlp_client_0_17svc53_3&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (DMZ2) to (outside) source dynamic WSUS interface&lt;BR /&gt;translate_hits = 1489532, untranslate_hits = 2084&lt;BR /&gt;2 (DMZ2) to (outside) source dynamic AV_SVR interface&lt;BR /&gt;translate_hits = 1803818, untranslate_hits = 23136&lt;BR /&gt;3 (InternetAccess) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (DMZ1) to (outside) source static WebProxy WebProxy destination static NETWORK_OBJ_10.12.19.240_28 NETWORK_OBJ_10.12.19.240_28 no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 568208, untranslate_hits = 1812856&lt;BR /&gt;5 (DMZ1) to (outside) source static NETWORK_OBJ_10.12.19.0_24 NETWORK_OBJ_10.12.19.0_24 destination static NETWORK_OBJ_10.12.19.240_28 NETWORK_OBJ_10.12.19.240_28 no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 3023, untranslate_hits = 3023&lt;BR /&gt;6 (DMZ1) to (outside) source dynamic WebProxy interface&lt;BR /&gt;translate_hits = 614090, untranslate_hits = 20&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (DMZ3) to (outside) source static server-1 interface service tcp 51210 51210&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (DMZ2) to (outside) source dynamic NAT_Mob interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 18:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307534#M1121717</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-07-09T18:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307535#M1121718</link>
      <description>&lt;P&gt;We are planning a replacement, but trying to get this to work in the meantime.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 18:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307535#M1121718</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-07-09T18:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307536#M1121719</link>
      <description>&lt;P&gt;The server was placed directly on the router (bypassing the firewall) with the WAN IP assigned. We found it did respond to a net connection test (PowerShell tnc) on port 51210. The goal was to ensure the device itself was responding properly on that port from a WAN-based connection.&lt;/P&gt;&lt;P&gt;Here are the requested commands:&lt;/P&gt;&lt;P&gt;show xlate:&lt;/P&gt;&lt;P&gt;29 in use, 161 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt;s - static, T - twice, N - net-to-net&lt;BR /&gt;UDP PAT from outside:0.0.0.0/0 53-53 to nlp_int_tap:0.0.0.0/0 53-53&lt;BR /&gt;flags srIT idle 1096:02:10 timeout 0:00:00&lt;BR /&gt;NAT from outside:0.0.0.0/0 to DMZ2:0.0.0.0/0&lt;BR /&gt;flags sIT idle 1096:02:10 timeout 0:00:00&lt;BR /&gt;NAT from outside:0.0.0.0/0 to DMZ2:0.0.0.0/0&lt;BR /&gt;flags sIT idle 1096:02:10 timeout 0:00:00&lt;BR /&gt;NAT from outside:0.0.0.0/0 to InternetAccess:0.0.0.0/0&lt;BR /&gt;flags sIT idle 1096:02:10 timeout 0:00:00&lt;BR /&gt;NAT from DMZ1:10.12.19.10 to outside:10.12.19.10&lt;BR /&gt;flags sIT idle 0:00:01 timeout 0:00:00&lt;BR /&gt;NAT from outside:10.12.19.240/28 to DMZ1:10.12.19.240/28&lt;BR /&gt;flags sIT idle 0:00:01 timeout 0:00:00&lt;BR /&gt;NAT from DMZ1:10.12.19.0/24 to outside:10.12.19.0/24&lt;BR /&gt;flags sIT idle 0:06:33 timeout 0:00:00&lt;BR /&gt;NAT from outside:10.12.19.240/28 to DMZ1:10.12.19.240/28&lt;BR /&gt;flags sIT idle 0:06:33 timeout 0:00:00&lt;BR /&gt;NAT from outside:0.0.0.0/0 to DMZ1:0.0.0.0/0&lt;BR /&gt;flags sIT idle 997:43:49 timeout 0:00:00&lt;BR /&gt;TCP PAT from DMZ3:10.12.13.200 51210-51210 to outside:1.2.3.4 51210-51210&lt;BR /&gt;flags sr idle 0:01:19 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ran the following capture:&amp;nbsp;&lt;SPAN&gt;capture cap-1 interface DMZ3 match tcp any host 10.12.13.200 eq 51210&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Completed a few connection tests to generate traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;show capture cap-1&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if there is anything else I sould try. I was thinking of bringing another firewall (non cisco) setting up a port foward and seeing if it works.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 18:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307536#M1121719</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-07-09T18:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307537#M1121720</link>
      <description>&lt;P&gt;Run NAT disappear anyway I take look&lt;/P&gt;
&lt;P&gt;There is 0 hits for NATing and Un-NATing meaning the traffic not hit NAT at all&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1- capute traffic in outside match tcp port 51210' see if traffic reach outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2- ping from Asa to server' if asa dont have arp or not reachable to server it not NATing traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 18:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307537#M1121720</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-09T18:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307539#M1121721</link>
      <description>&lt;P&gt;Packet-tracer output (official IPs omitted):&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 1.2.3.4 using egress ifc identity&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000555813aa033f flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure why the drop since there is a policy to allow the traffic:&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.12.13.200 eq 51210&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 18:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307539#M1121721</guid>
      <dc:creator>vdzpro</dc:creator>
      <dc:date>2025-07-09T18:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307542#M1121722</link>
      <description>&lt;P&gt;Correct one&lt;/P&gt;
&lt;P&gt;Packet tracer input OUTSIDE tcp 1.1.1.1 1234 &amp;lt;outside public IP&amp;gt; 51210 detail&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This how you do packet-tracer run it and share result&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 18:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307542#M1121722</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-09T18:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307548#M1121723</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL drop is expected when we do it on the reverse(Lower-higher sec Lvl) direction, But I want to make sure you tried packet tracer for the Public IP address not the DMZ server IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 19:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307548#M1121723</guid>
      <dc:creator>swj</dc:creator>
      <dc:date>2025-07-09T19:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with PAT Setup ASA 5508 9.16(1)</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307734#M1121730</link>
      <description>&lt;P&gt;So when the server was connected directly to the router it was responding on port 51210/tcp correctly? and now that you moved it behind the firewall it's not working anymore? if that is the case then we can discard a local firewall issue on the server side.&lt;/P&gt;
&lt;P&gt;Have you generated any traffic destined to the server when you ran the packet capture? if not, please do the capture again and while the capture is running generate some traffic from outside towards the server and see if anything gets captured.&lt;/P&gt;
&lt;P&gt;Although it should work with the configs you already have, I would suggest to try to move the server NAT rule to section 1 which is the manual section of the NAT table and see if that makes a difference. To do so, use this example please:&lt;/P&gt;
&lt;P&gt;object service TCP-51210&lt;BR /&gt;&amp;nbsp; &amp;nbsp;service tcp source eq 51210&lt;/P&gt;
&lt;P&gt;nat (DMZ3,outside) 1 source static&amp;nbsp;&lt;SPAN&gt;server-1 interface service TCP-51210 TCP-51210&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 08:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-pat-setup-asa-5508-9-16-1/m-p/5307734#M1121730</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-10T08:49:09Z</dc:date>
    </item>
  </channel>
</rss>

