<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If not needed, could you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027948#M135972</link>
    <description>&lt;P&gt;If not needed, could you please remove below NAT statements.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside) 0 access-list inside1_nat0_outbound&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (ASSR-TRSR) 0 access-list inside_nat0_outbound&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once done, please try to initiate a packet-tracer and let me know how it goes.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-AJ&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 03 May 2017 14:32:55 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2017-05-03T14:32:55Z</dc:date>
    <item>
      <title>Dynamic NAT/PAT problems</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027939#M135963</link>
      <description>&lt;P&gt;We are having issues with communication between private networks using a Cisco ASA 5505. &amp;nbsp;When we do a packet tracer we receive the following error.&lt;/P&gt;
&lt;P&gt;no nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;no nat (ASSR-TRSR) 0 access-list inside1_nat0_outbound&lt;BR /&gt;nat (inside) 0 access-list inside1_nat0_outbound&lt;BR /&gt;nat (ASSR-TRSR) 0 access-list inside_nat0_outbound&lt;/P&gt;
&lt;P&gt;We are trying to allow communication between the ASSR-TRSR network (192.168.100.x) and the inside (192.168.0.1/23)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "sho run"&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname BlaineCountyASA&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 64.250.198.160 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.254.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan6&lt;BR /&gt; nameif ASSR-TRSR&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service PC_Anywhere tcp-udp&lt;BR /&gt; description PC Anywhere&lt;BR /&gt; port-object eq 5630&lt;BR /&gt; port-object eq 5631&lt;BR /&gt;access-list 101 extended permit tcp host 64.250.192.5 any eq ssh &lt;BR /&gt;access-list 101 extended permit tcp host 208.87.239.180 any eq ssh &lt;BR /&gt;access-list 101 extended permit tcp host 65.255.81.200 any eq ssh inactive &lt;BR /&gt;access-list 101 extended permit tcp host 65.255.81.202 any eq ssh inactive &lt;BR /&gt;access-list 101 extended permit tcp any any eq www &lt;BR /&gt;access-list 101 extended permit tcp any any eq 59002 &lt;BR /&gt;access-list 101 extended permit udp any any eq 59002 &lt;BR /&gt;access-list 101 extended permit ip any host 64.250.198.162 inactive &lt;BR /&gt;access-list 101 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 101 extended permit tcp any host 64.250.198.161 eq pcanywhere-data &lt;BR /&gt;access-list 101 extended permit tcp 64.250.194.240 255.255.255.248 any eq telnet &lt;BR /&gt;access-list 101 extended permit ip any any &lt;BR /&gt;access-list 101 extended permit tcp host 64.250.192.5 any eq 8080 &lt;BR /&gt;access-list 101 extended permit tcp host 64.250.192.5 any eq telnet &lt;BR /&gt;access-list Pioneer_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.254.0 192.168.1.180 255.255.255.252 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.250.50.0 255.255.255.0 10.250.50.200 255.255.255.248 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.254 192.168.1.180 255.255.255.252 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.254 192.168.1.176 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.254 192.168.1.240 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.1.240 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.1.192 255.255.255.224 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.100.0 255.255.255.0 &lt;BR /&gt;access-list BlaineCountyCourthouse_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list BlaineCountyCourthouse_splitTunnelAcl standard permit 192.168.100.0 255.255.255.0 &lt;BR /&gt;access-list BC-Management_splitTunnelAcl standard permit 10.250.50.0 255.255.255.0 &lt;BR /&gt;access-list Pioneer_splitTunnelAcl_1 standard permit host 192.168.1.254 &lt;BR /&gt;access-list Pioneer_splitTunnelAcl_2 standard permit host 192.168.1.254 &lt;BR /&gt;access-list Pioneer1_splitTunnelAcl standard permit any &lt;BR /&gt;access-list Pioneer1_splitTunnelAcl_1 standard permit any &lt;BR /&gt;access-list ASSR-TRSR_access_in extended permit ip any any &lt;BR /&gt;access-list inside1_nat0_outbound extended permit ip any 192.168.0.0 255.255.254.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu ASSR-TRSR 1500&lt;BR /&gt;ip local pool pioneer 192.168.1.200-192.168.1.210 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface outside&lt;BR /&gt;monitor-interface inside&lt;BR /&gt;monitor-interface ASSR-TRSR&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside1_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (ASSR-TRSR) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (ASSR-TRSR) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp 64.250.198.161 ssh 192.168.1.254 ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ssh 192.168.100.1 ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 59002 192.168.1.15 59002 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 59002 192.168.1.15 59002 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface www 192.168.1.254 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.200 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 64.250.198.161 pcanywhere-data 192.168.1.201 pcanywhere-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 8080 192.168.1.254 8080 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp 64.250.198.161 pcanywhere-status 192.168.1.201 pcanywhere-status netmask 255.255.255.255 &lt;BR /&gt;access-group 101 in interface outside&lt;BR /&gt;access-group ASSR-TRSR_access_in in interface ASSR-TRSR&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 64.250.198.1 1&lt;BR /&gt;route inside 10.250.50.0 255.255.255.0 192.168.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;http server enable 444&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 80 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 80 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 100 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto dynamic-map outside_dyn_map 120 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 140 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 64.250.192.0 255.255.255.0 outside&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 64.250.194.240 255.255.255.248 outside&lt;BR /&gt;ssh 65.255.81.200 255.255.255.255 outside&lt;BR /&gt;ssh 65.255.81.202 255.255.255.255 outside&lt;BR /&gt;ssh 64.250.192.0 255.255.255.0 outside&lt;BR /&gt;ssh 208.87.239.180 255.255.255.255 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 64.250.192.64 64.250.192.65&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.50-192.168.1.175 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.100.75-192.168.100.99 ASSR-TRSR&lt;BR /&gt;dhcpd enable ASSR-TRSR&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;group-policy Pioneer internal&lt;BR /&gt;group-policy Pioneer attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Pioneer_splitTunnelAcl_2&lt;BR /&gt;group-policy Pioneer_1 internal&lt;BR /&gt;group-policy Pioneer_1 attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt;group-policy Pioneer1 internal&lt;BR /&gt;group-policy Pioneer1 attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Pioneer1_splitTunnelAcl&lt;BR /&gt;group-policy Pioneer1_1 internal&lt;BR /&gt;group-policy Pioneer1_1 attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Pioneer1_splitTunnelAcl_1&lt;BR /&gt;tunnel-group Pioneer1 type ipsec-ra&lt;BR /&gt;tunnel-group Pioneer1 general-attributes&lt;BR /&gt; address-pool pioneer&lt;BR /&gt; default-group-policy Pioneer1_1&lt;BR /&gt;tunnel-group Pioneer1 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:dd1e0721f6454745145f0dbf3612bff2&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "sho run"&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname BlaineCountyASA&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password WhhvJPvpKzk5zzOx encrypted&lt;BR /&gt;passwd bKTsJf.2KSXdgiJu encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 64.250.198.160 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.254.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan6&lt;BR /&gt; nameif ASSR-TRSR&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service PC_Anywhere tcp-udp&lt;BR /&gt; description PC Anywhere&lt;BR /&gt; port-object eq 5630&lt;BR /&gt; port-object eq 5631&lt;BR /&gt;access-list 101 extended permit tcp host 64.250.192.5 any eq ssh &lt;BR /&gt;access-list 101 extended permit tcp host 208.87.239.180 any eq ssh &lt;BR /&gt;access-list 101 extended permit tcp host 65.255.81.200 any eq ssh inactive &lt;BR /&gt;access-list 101 extended permit tcp host 65.255.81.202 any eq ssh inactive &lt;BR /&gt;access-list 101 extended permit tcp any any eq www &lt;BR /&gt;access-list 101 extended permit tcp any any eq 59002 &lt;BR /&gt;access-list 101 extended permit udp any any eq 59002 &lt;BR /&gt;access-list 101 extended permit ip any host 64.250.198.162 inactive &lt;BR /&gt;access-list 101 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 101 extended permit tcp any host 64.250.198.161 eq pcanywhere-data &lt;BR /&gt;access-list 101 extended permit tcp 64.250.194.240 255.255.255.248 any eq telnet &lt;BR /&gt;access-list 101 extended permit ip any any &lt;BR /&gt;access-list 101 extended permit tcp host 64.250.192.5 any eq 8080 &lt;BR /&gt;access-list 101 extended permit tcp host 64.250.192.5 any eq telnet &lt;BR /&gt;access-list Pioneer_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.254.0 192.168.1.180 255.255.255.252 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.250.50.0 255.255.255.0 10.250.50.200 255.255.255.248 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.254 192.168.1.180 255.255.255.252 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.254 192.168.1.176 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip host 192.168.1.254 192.168.1.240 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.1.240 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.1.192 255.255.255.224 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.100.0 255.255.255.0 &lt;BR /&gt;access-list BlaineCountyCourthouse_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list BlaineCountyCourthouse_splitTunnelAcl standard permit 192.168.100.0 255.255.255.0 &lt;BR /&gt;access-list BC-Management_splitTunnelAcl standard permit 10.250.50.0 255.255.255.0 &lt;BR /&gt;access-list Pioneer_splitTunnelAcl_1 standard permit host 192.168.1.254 &lt;BR /&gt;access-list Pioneer_splitTunnelAcl_2 standard permit host 192.168.1.254 &lt;BR /&gt;access-list Pioneer1_splitTunnelAcl standard permit any &lt;BR /&gt;access-list Pioneer1_splitTunnelAcl_1 standard permit any &lt;BR /&gt;access-list ASSR-TRSR_access_in extended permit ip any any &lt;BR /&gt;access-list inside1_nat0_outbound extended permit ip any 192.168.0.0 255.255.254.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu ASSR-TRSR 1500&lt;BR /&gt;ip local pool pioneer 192.168.1.200-192.168.1.210 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface outside&lt;BR /&gt;monitor-interface inside&lt;BR /&gt;monitor-interface ASSR-TRSR&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside1_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (ASSR-TRSR) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (ASSR-TRSR) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp 64.250.198.161 ssh 192.168.1.254 ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ssh 192.168.100.1 ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 59002 192.168.1.15 59002 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 59002 192.168.1.15 59002 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface www 192.168.1.254 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.200 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp 64.250.198.161 pcanywhere-data 192.168.1.201 pcanywhere-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 8080 192.168.1.254 8080 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp 64.250.198.161 pcanywhere-status 192.168.1.201 pcanywhere-status netmask 255.255.255.255 &lt;BR /&gt;access-group 101 in interface outside&lt;BR /&gt;access-group ASSR-TRSR_access_in in interface ASSR-TRSR&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 64.250.198.1 1&lt;BR /&gt;route inside 10.250.50.0 255.255.255.0 192.168.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;http server enable 444&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 80 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 80 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 100 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto dynamic-map outside_dyn_map 120 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 140 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 64.250.192.0 255.255.255.0 outside&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 64.250.194.240 255.255.255.248 outside&lt;BR /&gt;ssh 65.255.81.200 255.255.255.255 outside&lt;BR /&gt;ssh 65.255.81.202 255.255.255.255 outside&lt;BR /&gt;ssh 64.250.192.0 255.255.255.0 outside&lt;BR /&gt;ssh 208.87.239.180 255.255.255.255 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 64.250.192.64 64.250.192.65&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.50-192.168.1.175 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.100.75-192.168.100.99 ASSR-TRSR&lt;BR /&gt;dhcpd enable ASSR-TRSR&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;group-policy Pioneer internal&lt;BR /&gt;group-policy Pioneer attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Pioneer_splitTunnelAcl_2&lt;BR /&gt;group-policy Pioneer_1 internal&lt;BR /&gt;group-policy Pioneer_1 attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt;group-policy Pioneer1 internal&lt;BR /&gt;group-policy Pioneer1 attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Pioneer1_splitTunnelAcl&lt;BR /&gt;group-policy Pioneer1_1 internal&lt;BR /&gt;group-policy Pioneer1_1 attributes&lt;BR /&gt; dns-server value 64.250.192.64 64.250.192.65&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Pioneer1_splitTunnelAcl_1&lt;BR /&gt;username guest password XCliFt2XshXZoRA9 encrypted&lt;BR /&gt;username sposterholt password boIS4rk/El4peTMY encrypted privilege 15&lt;BR /&gt;username jasanders password eoghszRiUaeEwUGS encrypted privilege 15&lt;BR /&gt;username jfreherman password yf0ptveeGqORs3H3 encrypted privilege 15&lt;BR /&gt;tunnel-group Pioneer1 type ipsec-ra&lt;BR /&gt;tunnel-group Pioneer1 general-attributes&lt;BR /&gt; address-pool pioneer&lt;BR /&gt; default-group-policy Pioneer1_1&lt;BR /&gt;tunnel-group Pioneer1 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:dd1e0721f6454745145f0dbf3612bff2&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027939#M135963</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2019-03-12T09:18:20Z</dc:date>
    </item>
    <item>
      <title>Could you please attach a</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027940#M135964</link>
      <description>&lt;P&gt;Could you please attach a packet-tracer output.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 12:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027940#M135964</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-03T12:44:42Z</dc:date>
    </item>
    <item>
      <title>Result of the command:</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027941#M135965</link>
      <description>&lt;P&gt;Result of the command: "packet-tracer input inside rawip 192.168.1.5 80 192.168.100.5"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.100.0 255.255.255.0 ASSR-TRSR&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; match ip inside any ASSR-TRSR any&lt;BR /&gt; dynamic translation to pool 1 (No matching global)&lt;BR /&gt; translate_hits = 3, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ASSR-TRSR&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027941#M135965</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2017-05-03T13:17:01Z</dc:date>
    </item>
    <item>
      <title>Phase: 5Type: NATSubtype:</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027942#M135966</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match ip inside any ASSR-TRSR any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dynamic translation to pool 1 (No matching global)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;translate_hits = 3, untranslate_hits = 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yeah, so here is the issue. We don't have global statement corresponding to NAT statement.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you add below statement, it should work. This will PAT the source user to ASSR-TRSR interface while trying to access the 192.168.100.0/24 network.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;global (ASSR-TRSR) 1 interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-AJ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027942#M135966</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-03T13:21:06Z</dc:date>
    </item>
    <item>
      <title>here is the fail now on</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027943#M135967</link>
      <description>&lt;P&gt;here is the fail now on packet tracer.&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; match ip inside any ASSR-TRSR any&lt;BR /&gt; dynamic translation to pool 1 (192.168.100.2 [Interface PAT])&lt;BR /&gt; translate_hits = 4, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027943#M135967</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2017-05-03T13:24:58Z</dc:date>
    </item>
    <item>
      <title>Could you please attach the</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027944#M135968</link>
      <description>&lt;P&gt;Could you please attach the complete output.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027944#M135968</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-03T13:31:48Z</dc:date>
    </item>
    <item>
      <title>Result of the command:</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027945#M135969</link>
      <description>&lt;P&gt;Result of the command: "packet-tracer input inside rawip 192.168.1.5 80 192.168.100.5"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.100.0 255.255.255.0 ASSR-TRSR&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; match ip inside any ASSR-TRSR any&lt;BR /&gt; dynamic translation to pool 1 (192.168.100.2 [Interface PAT])&lt;BR /&gt; translate_hits = 4, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ASSR-TRSR&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027945#M135969</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2017-05-03T13:33:24Z</dc:date>
    </item>
    <item>
      <title>The NAT statements are kind</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027946#M135970</link>
      <description>&lt;P&gt;The NAT statements are kind of strange and not sure what is the overall purpose. Looks like there is no NAT for the traffic coming from ASSR-TRSR to inside. For testing, could you please add below statement and let me know if it works:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;static (ASSR-TRSR,inside) static 192.168.100.5 192.168.100.5&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027946#M135970</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-03T13:50:00Z</dc:date>
    </item>
    <item>
      <title>We have a few nat statements</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027947#M135971</link>
      <description>&lt;P&gt;We have a few nat statements for outside access back in. &amp;nbsp;Pretty much all others were made in troubleshooting this issue of trying to get these networks to talk to each other. &amp;nbsp;It is still failing. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "packet-tracer input inside rawip 192.168.1.5 80 192.168.100.5"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;BR /&gt; match ip ASSR-TRSR host 192.168.100.5 inside any&lt;BR /&gt; static translation to 192.168.100.5&lt;BR /&gt; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface ASSR-TRSR&lt;BR /&gt;Untranslate 192.168.100.5/0 to 192.168.100.5/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; match ip inside any ASSR-TRSR any&lt;BR /&gt; dynamic translation to pool 1 (192.168.100.2 [Interface PAT])&lt;BR /&gt; translate_hits = 5, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ASSR-TRSR&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 13:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027947#M135971</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2017-05-03T13:54:57Z</dc:date>
    </item>
    <item>
      <title>If not needed, could you</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027948#M135972</link>
      <description>&lt;P&gt;If not needed, could you please remove below NAT statements.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside) 0 access-list inside1_nat0_outbound&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (ASSR-TRSR) 0 access-list inside_nat0_outbound&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once done, please try to initiate a packet-tracer and let me know how it goes.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-AJ&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 14:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027948#M135972</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-03T14:32:55Z</dc:date>
    </item>
    <item>
      <title>We get the same response-</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027949#M135973</link>
      <description>&lt;P&gt;We get the same response-&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip ASSR-TRSR host 192.168.100.5 inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface ASSR-TRSR&lt;BR /&gt;Untranslate 192.168.100.5/0 to 192.168.100.5/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip inside any ASSR-TRSR any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 308, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ASSR-TRSR&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2017 21:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027949#M135973</guid>
      <dc:creator>jasanders</dc:creator>
      <dc:date>2017-05-03T21:20:08Z</dc:date>
    </item>
    <item>
      <title>Could you please make sure we</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027950#M135974</link>
      <description>&lt;P&gt;Could you please make sure we also have in config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;global (ASSR-TRSR) 1 interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 12:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027950#M135974</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-04T12:40:53Z</dc:date>
    </item>
    <item>
      <title>icmp permit any insideasdm</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027951#M135975</link>
      <description>&lt;P&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (ASSR-TRSR) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (ASSR-TRSR) 1 0.0.0.0 0.0.0.0&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 20:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027951#M135975</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2017-05-04T20:41:29Z</dc:date>
    </item>
    <item>
      <title>Please run a packet-tracer</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027952#M135976</link>
      <description>&lt;P&gt;Please run a packet-tracer and attach the complete output:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input inside tcp 192.168.1.5 3344 192.168.100.5 80 det&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 20:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027952#M135976</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-04T20:50:21Z</dc:date>
    </item>
    <item>
      <title>Result of the command:</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027953#M135977</link>
      <description>&lt;P&gt;Result of the command: "packet-tracer input inside tcp 192.168.1.5 3344 192.168.100.5 80 det"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;BR /&gt; match ip ASSR-TRSR host 192.168.100.5 inside any&lt;BR /&gt; static translation to 192.168.100.5&lt;BR /&gt; translate_hits = 0, untranslate_hits = 5&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface ASSR-TRSR&lt;BR /&gt;Untranslate 192.168.100.5/0 to 192.168.100.5/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x3ca63f8, priority=2, domain=permit, deny=false&lt;BR /&gt; hits=539, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x3ca8700, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt; hits=7993885, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; match ip inside any ASSR-TRSR any&lt;BR /&gt; dynamic translation to pool 1 (192.168.100.2 [Interface PAT])&lt;BR /&gt; translate_hits = 312, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.5/3344 to 192.168.100.2/1024 using netmask 255.255.255.255&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x44e48d8, priority=1, domain=nat, deny=false&lt;BR /&gt; hits=311, user_data=0x44e4868, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; match ip inside any outside any&lt;BR /&gt; dynamic translation to pool 1 (64.250.198.160 [Interface PAT])&lt;BR /&gt; translate_hits = 5227811, untranslate_hits = 323804&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x43f7c48, priority=1, domain=host, deny=false&lt;BR /&gt; hits=5385526, user_data=0x473c938, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;BR /&gt; match ip ASSR-TRSR host 192.168.100.5 inside any&lt;BR /&gt; static translation to 192.168.100.5&lt;BR /&gt; translate_hits = 0, untranslate_hits = 5&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x3c5ac28, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt; hits=0, user_data=0x3c88f68, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=192.168.100.5, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;BR /&gt; match ip ASSR-TRSR host 192.168.100.5 inside any&lt;BR /&gt; static translation to 192.168.100.5&lt;BR /&gt; translate_hits = 0, untranslate_hits = 5&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x3d2bc08, priority=5, domain=host, deny=false&lt;BR /&gt; hits=5, user_data=0x3c88f68, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=192.168.100.5, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x3cd76f8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt; hits=3248330, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 12604650, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ASSR-TRSR&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 20:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027953#M135977</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2017-05-04T20:54:02Z</dc:date>
    </item>
    <item>
      <title>This looks good. The actual</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027954#M135978</link>
      <description>&lt;P&gt;This looks good. The actual traffic should work as well. I don't know what you tried earlier.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 20:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027954#M135978</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-04T20:59:40Z</dc:date>
    </item>
    <item>
      <title>works from inside to ASSR but</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027955#M135979</link>
      <description>&lt;P&gt;works from inside to ASSR but not the other way around.&lt;/P&gt;
&lt;P&gt;Result of the command: "packet-tracer input ASSR-TRSR tcp 192.168.100.5 3344 192.168.1.5 80 det"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.0.0 255.255.254.0 inside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group ASSR-TRSR_access_in in interface ASSR-TRSR&lt;BR /&gt;access-list ASSR-TRSR_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x3c77c08, priority=12, domain=permit, deny=false&lt;BR /&gt; hits=238742, user_data=0x3c84908, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x3cd76f8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt; hits=3249053, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;BR /&gt; match ip ASSR-TRSR host 192.168.100.5 inside any&lt;BR /&gt; static translation to 192.168.100.5&lt;BR /&gt; translate_hits = 4, untranslate_hits = 6&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.100.5/0 to 192.168.100.5/0 using netmask 255.255.255.255&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x473dde8, priority=5, domain=nat, deny=false&lt;BR /&gt; hits=3, user_data=0x3c88f68, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=192.168.100.5, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;BR /&gt; match ip ASSR-TRSR host 192.168.100.5 inside any&lt;BR /&gt; static translation to 192.168.100.5&lt;BR /&gt; translate_hits = 4, untranslate_hits = 6&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x3d2bc08, priority=5, domain=host, deny=false&lt;BR /&gt; hits=15, user_data=0x3c88f68, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=192.168.100.5, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; match ip inside any ASSR-TRSR any&lt;BR /&gt; dynamic translation to pool 1 (192.168.100.2 [Interface PAT])&lt;BR /&gt; translate_hits = 313, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x3d17d78, priority=1, domain=nat-reverse, deny=false&lt;BR /&gt; hits=392, user_data=0x44e4868, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: ASSR-TRSR&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 20:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027955#M135979</guid>
      <dc:creator>fisherman0302</dc:creator>
      <dc:date>2017-05-04T20:59:43Z</dc:date>
    </item>
    <item>
      <title>Thats expected since that is</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027956#M135980</link>
      <description>&lt;P&gt;Thats expected since that is a different requirement. If you need communication from both sides, we would need self NAT:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;try below:&lt;/P&gt;
&lt;P&gt;no&amp;nbsp;&lt;SPAN&gt;static (ASSR-TRSR,inside) 192.168.100.5 192.168.100.5 netmask 255.255.255.255 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (inside,ASSR-TRSR) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (ASSR-TRSR,inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-AJ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 13:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027956#M135980</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-05T13:26:20Z</dc:date>
    </item>
    <item>
      <title>Looking better...we will</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027957#M135981</link>
      <description>&lt;P&gt;Looking better...we will update. Thanks so much for your assistance. I have issues working with the older pre-8.3 NAT stuff...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Judith&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;BlaineCountyASA# packet-tracer input inside tcp 192.168.1.5 3344 192.168.100.5$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip ASSR-TRSR 192.168.100.0 255.255.255.0 inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface ASSR-TRSR&lt;BR /&gt;Untranslate 192.168.100.0/0 to 192.168.100.0/0 using netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x3ca63f8, priority=2, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=541, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x3ca8700, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=8040721, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,ASSR-TRSR) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 ASSR-TRSR any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.1.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.1.0/0 to 192.168.1.0/0 using netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x4490050, priority=5, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x44e24f8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,ASSR-TRSR) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 ASSR-TRSR any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.1.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x455df08, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=115, user_data=0x44e24f8, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip ASSR-TRSR 192.168.100.0 255.255.255.0 inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x4777290, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x3c79b88, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=192.168.100.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (ASSR-TRSR,inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip ASSR-TRSR 192.168.100.0 255.255.255.0 inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x454cae8, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=8, user_data=0x3c79b88, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.100.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x3cd76f8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3266191, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 12676367, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ASSR-TRSR&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 13:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027957#M135981</guid>
      <dc:creator>jasanders</dc:creator>
      <dc:date>2017-05-05T13:55:34Z</dc:date>
    </item>
    <item>
      <title>Glad to help. Please rate and</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027958#M135982</link>
      <description>&lt;P&gt;Glad to help. Please rate and mark answer as correct if it helped.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 16:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-pat-problems/m-p/3027958#M135982</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-05T16:20:58Z</dc:date>
    </item>
  </channel>
</rss>

