<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 9.1 5540 NAT statement not getting hit in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3842028#M11511</link>
    <description>&lt;P&gt;I'm not entirely sure how you are testing the webpage. Is the server you are running https? If so you may need to do a port translation/forward as you ASA Outside Interface will be listening on port 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try the following but I am running out of ideas as all my testing on my own firewall works and I have even tested this with the same image as you have also.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remove the following NAT setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network webserver_8080&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (dmz,outside) static interface service tcp 8080 8080&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and amend it to the following&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network webserver_8080&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;host 192.168.2.100&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) static interface service tcp https 8080&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now from the Outside - Access your server on https://publicIP:8080&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will forward the traffic to the server on 443 rather than you directing it at the Outside Interface. This works fine for my server listening on 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 20 Apr 2019 15:35:06 GMT</pubDate>
    <dc:creator>John Paul Innes</dc:creator>
    <dc:date>2019-04-20T15:35:06Z</dc:date>
    <item>
      <title>Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838029#M11454</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am an amateur when it comes to the true science behind some of what I am trying to configure so I love to hear explanations as to why it is not working, as well as get it fixed.&amp;nbsp; I have a Cisco 5540 running 9.1.&amp;nbsp; I have an outside, p_wired, dmz, private interfaces setup and working.&amp;nbsp; Everyone can access the internet like I would expect.&amp;nbsp; The dmz_webserver can access the outside in order to do updates but I cannot get to the website that I want to host on the dmz_webserver from the public internet.&amp;nbsp; Below is my current running config.&amp;nbsp; The immediate packet-tracer command shows a result of allow, so I am truly lost.&amp;nbsp; Any help is truly appreciated.&amp;nbsp; I have been reading and studying for almost 2 weeks because I like to try and figure things like this out myself.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="Courier New, serif"&gt;&lt;FONT size="2"&gt;packet-tracer input outside tcp 18.218.108.31 &lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="Courier New, serif"&gt;&lt;FONT size="2"&gt;1234&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="Courier New, serif"&gt;&lt;FONT size="2"&gt; 192.168.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="Courier New, serif"&gt;&lt;FONT size="2"&gt;2&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="Courier New, serif"&gt;&lt;FONT size="2"&gt;.100 80 detailed&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The p_wired interface has good internet access and I can carry out all tasks needed.&amp;nbsp; I can access the dmz interface from the p_wired as I would like because of the security-level settings are working.&amp;nbsp; The dmz has good internet access to the server and any other device I connect to it.&amp;nbsp; The private network is not a concern and is working as expected.&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;ASA Version 9.1(7)23&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password [removed]&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif p_wired&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.16.1.1 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 25&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;nameif private&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.0.0.1 255.0.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup p_wired&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 4.4.2.2&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network dmz_webserver&lt;BR /&gt;host 192.168.2.100&lt;BR /&gt;object network outside_acl&lt;BR /&gt;object network dmz_acl&lt;BR /&gt;object service HTTP-8080&lt;BR /&gt;service tcp source eq 8080&lt;BR /&gt;object service HTTP-80&lt;BR /&gt;service tcp source eq www&lt;BR /&gt;object network dmz_subnet&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list outside_acl extended permit tcp any4 object dmz_webserver eq www&lt;BR /&gt;access-list outside_acl extended permit tcp any4 object dmz_webserver eq 8080&lt;BR /&gt;access-list outside_acl extended permit tcp any object dmz_webserver eq www&lt;BR /&gt;access-list outside_acl extended permit tcp any any eq www&lt;BR /&gt;access-list outside_acl extended permit tcp any any eq 8080&lt;BR /&gt;access-list outside_acl extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu p_wired 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu private 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;arp permit-nonconnected&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;nat (p_wired,outside) source dynamic any interface&lt;BR /&gt;nat (dmz,outside) source static any dmz_webserver service HTTP-80 HTTP-80&lt;BR /&gt;nat (dmz,outside) source static any dmz_webserver service HTTP-8080 HTTP-8080&lt;BR /&gt;nat (dmz,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network dmz_webserver&lt;BR /&gt;nat (dmz,outside) static interface&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 8.8.8.8 4.4.2.2&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.100.1-172.16.100.100 p_wired&lt;BR /&gt;dhcpd enable p_wired&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.2.100-192.168.2.120 dmz&lt;BR /&gt;dhcpd enable dmz&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.10.1-10.10.10.100 private&lt;BR /&gt;dhcpd enable private&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host number-of-rate 2&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:[removed]&lt;BR /&gt;: end&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;---- Below is the result of NAT translation after I ran the packet-tracer command at the beginning twice.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (p_wired) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 324, untranslate_hits = 5&lt;BR /&gt;2 (dmz) to (outside) source static any dmz_webserver service HTTP-80 HTTP-80&lt;BR /&gt;translate_hits = 2, untranslate_hits = 2&lt;BR /&gt;3 (dmz) to (outside) source static any dmz_webserver service HTTP-8080 HTTP-8080&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (dmz) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (dmz) to (outside) source static dmz_webserver interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;If you need anything else to help me out please let me know.&amp;nbsp; I know the dmz_webserver is working and the ports are listening because I have verified with the netstat command and I can access the website from either a dmz or p_wired connected device.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;Eldon&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838029#M11454</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2020-02-21T17:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838034#M11455</link>
      <description>I would remove the following two nats&lt;BR /&gt;&lt;BR /&gt;nat (dmz,outside) source static any&lt;BR /&gt;dmz_webserver service HTTP-80 HTTP-80&lt;BR /&gt;nat (dmz,outside) source static any dmz_webserver service HTTP-8080 HTTP-8080&lt;BR /&gt;Amend the following nat&lt;BR /&gt;nat (dmz,outside) source dynamic any interface&lt;BR /&gt;To&lt;BR /&gt;&lt;BR /&gt;nat (dmz,outside) after-auto source dynamic any interface</description>
      <pubDate>Sat, 13 Apr 2019 13:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838034#M11455</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-13T13:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838036#M11456</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; I am open to any troubleshooting at this point.&amp;nbsp; I did as you described and I had tried that setup before, but it was worth another try.&amp;nbsp; This didn't work, and actually caused the packet-tracer to drop the test packet-tracer and the external attempt to access the website failed (&lt;SPAN&gt;ERR_CONNECTION_TIMED_OUT).&amp;nbsp; When I run Wireshark capture I can see that the SYN packets always perform a resend and never get an ACK.&amp;nbsp; Not sure if that helps.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (p_wired) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 1831, untranslate_hits = 25&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (dmz) to (outside) source static dmz_webserver interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (dmz) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input outside tcp 18.218.108.31 1234 192.168.2$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79b61700, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=568403, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.2.0 255.255.255.0 dmz&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;access-list outside_acl extended permit tcp any4 object dmz_webserver eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79cf0c70, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=4, user_data=0x7610d640, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=192.168.2.100, mask=255.255.255.255, port=80, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x794d5ed0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=25264, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79c052e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=10321, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network dmz_webserver&lt;BR /&gt;nat (dmz,outside) static interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x79cc3260, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x79381300, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=192.168.2.100, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=dmz&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2019 13:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838036#M11456</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-13T13:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838038#M11458</link>
      <description>Hi,&lt;BR /&gt;You are being dropped for RPF check.&lt;BR /&gt;&lt;BR /&gt;Can you run the packet-tracer again, with the outside interface IP address as the destination rather than the private IP address of the dmz server. Post the output here for review.</description>
      <pubDate>Sat, 13 Apr 2019 13:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838038#M11458</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-13T13:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838041#M11460</link>
      <description>&lt;P&gt;Thank you for all the help so far.&amp;nbsp; I cannot show my appreciation enough for your time and knowledge sharing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we are onto a path of teaching me something.&amp;nbsp; This is the first time I have got the packet-tracer to allow the packet through the destination G0/0 IP (outside).&amp;nbsp; Below are the results you requested.&amp;nbsp; Not sure if this helps your analysis but my G0/0 (outside) is given an IP from the ISP.&amp;nbsp; My ISP router is in bridge mode just to pass traffic to my ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="Courier New, serif"&gt;&lt;FONT size="2"&gt;packet-tracer input outside tcp 18.218.108.31 80 [removed g0/0 ip] 80&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79b61700, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=574261, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;access-list outside_acl extended permit tcp any any eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79cc36f8, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=7, user_data=0x7610d4c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x794d5ed0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=25952, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x79c052e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=10738, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x794d5ed0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=25954, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x79c052e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=10740, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10978, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2019 13:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838041#M11460</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-13T13:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838105#M11462</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you add the following static NAT for the webserver and new object group just to keep things clean for testing -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group service OBJ_G_WEB_PORTS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description WEB_PORTS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;service-object tcp eq 80&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;service-object tcp eq 443&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;nat (dmz,outside) source static dmz_webserver interface service OBJ_G_WEB_PORTS OBJ_G_WEB_PORTS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remove all the current DMZ related NATs first and then add the above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If there is nothing else that sits behind the DMZ requiring a static NAT then configure PAT for the rest of the DMZ after that will be processed after the static NAT -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network OBJ_DMZ&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network OBJ_DMZ&lt;BR /&gt;nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before any testing I would clear any open xlates from the table (if this is a test environment)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2019 20:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838105#M11462</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-13T20:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838131#M11464</link>
      <description>&lt;P&gt;Could you clarify or refine your recommendations?&amp;nbsp; I am getting an error trying to implement your first NAT statement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config-network-object)# object-group service OBJ_G_WEB_PORTS&lt;BR /&gt;ciscoasa(config-service-object-group)# service-object tcp eq 80&lt;BR /&gt;ciscoasa(config-service-object-group)# service-object tcp eq 443&lt;BR /&gt;ciscoasa(config-service-object-group)# exit&lt;BR /&gt;ciscoasa(config)# nat (dmz,outside) source static dmz_webserver interface serv$&lt;BR /&gt;ERROR: OBJ_G_WEB_PORTS is not a valid service object name&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2019 22:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838131#M11464</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-13T22:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838156#M11466</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at this again, you will be bound by one port at a time for the the NAT using services. Try the following, removing previous DMZ NATs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network OBJ_DMZ_80&lt;/P&gt;&lt;P&gt;host&amp;nbsp;&lt;SPAN&gt;192.168.2.100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat (dmz,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network OBJ_DMZ_8080&lt;/P&gt;&lt;P&gt;host&amp;nbsp;192.168.2.100&lt;BR /&gt;nat (dmz,outside) static interface service tcp 8080 8080&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would only test the server dmz nats for now then add dmz subnet pat once all good. Then tidy up test / redundant objects.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2019 23:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838156#M11466</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-13T23:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838217#M11467</link>
      <description>&lt;P&gt;Those two nat statements executed successfully, however that didn't seem to do anything.&amp;nbsp; I get an ACL drop on the below packet tracer command, and when I try to navigate to the website from the public internet the NAT is not getting any hits.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is next on the list to try?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;FONT face="Courier New, serif"&gt;&lt;FONT size="2"&gt;packet-tracer input outside tcp 18.218.108.31 123 [removed ip] 80&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="western"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2019 08:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838217#M11467</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-15T08:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838223#M11468</link>
      <description>&lt;P&gt;Can I see a current show run nat and also a show nat output, please.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2019 10:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838223#M11468</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-14T10:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838225#M11469</link>
      <description>Also, output of show access-list&lt;BR /&gt;Do you see hits on outside ACL?</description>
      <pubDate>Sun, 14 Apr 2019 10:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838225#M11469</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-14T10:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838228#M11470</link>
      <description>&lt;P&gt;I don't see hits to the ACL.&amp;nbsp; The (5) hits to the Line 1 ACL below is from previous testing.&amp;nbsp; I haven't altered the ACL for this specific set of testing.&amp;nbsp; I also can't get NMAP to report any of the ports as open.&amp;nbsp; So, I am still lost and appreciate any help or recommendations you offer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show run nat&lt;BR /&gt;nat (p_wired,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network OBJ_DMZ_80&lt;BR /&gt;nat (dmz,outside) static interface service tcp www www&lt;BR /&gt;object network OBJ_DMZ_8080&lt;BR /&gt;nat (dmz,outside) static interface service tcp 8080 8080&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa(config)# show nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (p_wired) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 13885, untranslate_hits = 593&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (dmz) to (outside) source static OBJ_DMZ_80 interface service tcp www www&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (dmz) to (outside) source static OBJ_DMZ_8080 interface service tcp 8080 8080&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa(config)# show access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;alert-interval 300&lt;BR /&gt;access-list outside_acl; 6 elements; name hash: 0x6b8df462&lt;BR /&gt;access-list outside_acl line 1 extended permit tcp any4 object dmz_webserver eq www (hitcnt=5) 0x7c82cf95&lt;BR /&gt;access-list outside_acl line 1 extended permit tcp any4 host 192.168.2.100 eq www (hitcnt=5) 0x7c82cf95&lt;BR /&gt;access-list outside_acl line 2 extended permit tcp any4 object dmz_webserver eq 8080 (hitcnt=0) 0x4d1442bd&lt;BR /&gt;access-list outside_acl line 2 extended permit tcp any4 host 192.168.2.100 eq 8080 (hitcnt=0) 0x4d1442bd&lt;BR /&gt;access-list outside_acl line 3 extended permit tcp any object dmz_webserver eq www (hitcnt=0) 0xc62102d5&lt;BR /&gt;access-list outside_acl line 3 extended permit tcp any host 192.168.2.100 eq www (hitcnt=0) 0xc62102d5&lt;BR /&gt;access-list outside_acl line 4 extended permit tcp any any eq www (hitcnt=10) 0xf13d4901&lt;BR /&gt;access-list outside_acl line 5 extended permit tcp any any eq 8080 (hitcnt=0) 0x63c2fd73&lt;BR /&gt;access-list outside_acl line 6 extended permit ip any any (hitcnt=631) 0x31f6627e&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2019 10:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838228#M11470</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-14T10:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838245#M11471</link>
      <description>Can I see the packet tracer output for your test.&lt;BR /&gt;Regardless of this are you certain the ISP is forwarding ports etc for Inbound static NATs to the interfaces? I see the Outside IP is DHCP.</description>
      <pubDate>Sun, 14 Apr 2019 12:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838245#M11471</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-14T12:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838255#M11472</link>
      <description>What is the output from show run all sysopt?</description>
      <pubDate>Sun, 14 Apr 2019 13:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838255#M11472</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-14T13:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838257#M11473</link>
      <description>&lt;P&gt;Just spoke with the ISP and they claim all ports are open except for 19, 23, 53, 1900.&amp;nbsp; I am going to work on some modem configurations (again) to see if I overlooked something (doubtful).&amp;nbsp; But I put it in Bridged mode so I would expect if the ports are open like they claim it would hit either a NAT or ACL when I attempt the website from the public internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show run all sysopt&lt;BR /&gt;no sysopt connection timewait&lt;BR /&gt;sysopt connection tcpmss 1380&lt;BR /&gt;sysopt connection tcpmss minimum 0&lt;BR /&gt;sysopt connection permit-vpn&lt;BR /&gt;sysopt connection reclassify-vpn&lt;BR /&gt;no sysopt connection preserve-vpn-flows&lt;BR /&gt;no sysopt radius ignore-secret&lt;BR /&gt;no sysopt noproxyarp outside&lt;BR /&gt;no sysopt noproxyarp p_wired&lt;BR /&gt;no sysopt noproxyarp dmz&lt;BR /&gt;no sysopt noproxyarp private&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2019 14:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838257#M11473</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-14T14:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838282#M11474</link>
      <description>&lt;P&gt;What is the output from show dhcpd state?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2019 16:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838282#M11474</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-14T16:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838313#M11475</link>
      <description>&lt;P&gt;ciscoasa(config)# show dhcpd state&lt;BR /&gt;Context Configured as DHCP Server&lt;BR /&gt;Interface outside, Configured for DHCP CLIENT&lt;BR /&gt;Interface p_wired, Configured for DHCP SERVER&lt;BR /&gt;Interface dmz, Configured for DHCP SERVER&lt;BR /&gt;Interface private, Configured for DHCP SERVER&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2019 18:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838313#M11475</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-14T18:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838325#M11476</link>
      <description>&lt;P&gt;Stupid question.&amp;nbsp; Do I have to create any NAT or ACL rules if there is a switch connected to G0/2 (dmz) interface?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Apr 2019 20:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838325#M11476</guid>
      <dc:creator>efreymuth_2</dc:creator>
      <dc:date>2019-04-14T20:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838326#M11478</link>
      <description>What is your packet tracer output now btw? I would have expected to see an UN-NAT.&lt;BR /&gt;I'm not sure of this is related to the DHCP on the OUTSIDE interface. Do you know if this is a public IP you are getting or a rfc1918 and then it is being NAT'd again by ISP for outbound?&lt;BR /&gt;I've always worked with physically assigned addresses on the ASA.</description>
      <pubDate>Sun, 14 Apr 2019 20:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838326#M11478</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-14T20:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 9.1 5540 NAT statement not getting hit</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838336#M11480</link>
      <description>If L2 no, and wouldn't stop you from at least seeing something coming Inbound from the Internet. It's as if the traffic from Internet directed to server is not getting as far as firewall.&lt;BR /&gt;How are you connecting to the server from the Internet btw? DNS? IP?&lt;BR /&gt;Have you double checked the address?&lt;BR /&gt;I wonder if anyone else has got a static port forward working with a DHCP Outside dynamic address.&lt;BR /&gt;&lt;BR /&gt;You could run a packet capture direct on the asa itself and let it run while you test again, see if traffic gets as far as outside interface.</description>
      <pubDate>Sun, 14 Apr 2019 20:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-5540-nat-statement-not-getting-hit/m-p/3838336#M11480</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-14T20:40:18Z</dc:date>
    </item>
  </channel>
</rss>

