<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static PAT on ASA5508 not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692778#M14526</link>
    <description>The output of packet tracer would usually indicate what nat rule, acl was matched....it doesn't here.&lt;BR /&gt;&lt;BR /&gt;What values are you putting in the packet-tracer command? Can you re-run the packet-tracer and append "detailed" at the end. Provide the full output&lt;BR /&gt;&lt;BR /&gt;Can you provide the output of "show xlate | inc &amp;lt;external-ip-address&amp;gt;", see if it's actually matching.</description>
    <pubDate>Wed, 22 Aug 2018 09:33:45 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-08-22T09:33:45Z</dc:date>
    <item>
      <title>Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691483#M14509</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;I'm trying to set up a static PAT to a host behind an ASA. Public IP port 2222 is supposed to connect to port 22 of the internal IP 192.168.10.11&lt;/P&gt;
&lt;P&gt;The packet-tracer result looks as if it gets highjacked by another NAT rule.&lt;/P&gt;
&lt;P&gt;I have included the config bits below. x.x.x.98 is the public ip of the outside interface.&lt;/P&gt;
&lt;P&gt;I have removed four NAT rules from the sh nat result (they work and don't seem to be part of the problem).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network MGMT-INSIDE-HOSTS&lt;BR /&gt;&amp;nbsp;range 10.10.18.0 255.255.255.128&lt;BR /&gt;object network VPN-HOSTS&lt;BR /&gt;&amp;nbsp;range 10.10.10.128 255.255.255.192&lt;BR /&gt;object network MGMT-LAN-AP&lt;BR /&gt;&amp;nbsp;range 10.10.13.128 255.255.255.128&lt;BR /&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;range 192.168.10.0 255.255.255.0&lt;BR /&gt;object network SERVER-SSH&lt;BR /&gt;&amp;nbsp;host 192.168.10.11&lt;BR /&gt;object network EXT-Service-IP&lt;BR /&gt;&amp;nbsp;host x.x.x.18&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;nat (lanmgmt,outside) source static MGMT-LAN-AP MGMT-LAN-AP destination static VPN-HOSTS VPN-HOSTS&lt;BR /&gt;nat (inside,outside) source static MGMT-INSIDE-HOSTS MGMT-INSIDE-HOSTS destination static VPN-HOSTS VPN-HOSTS&lt;BR /&gt;nat (inside,outside) source dynamic MGMT-INSIDE-HOSTS interface&lt;BR /&gt;!&lt;BR /&gt;object network MGMT-INSIDE-HOSTS&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network SERVER-SSH&lt;BR /&gt;&amp;nbsp;nat (server,outside) static interface service tcp ssh 2222&lt;BR /&gt;!&lt;BR /&gt;nat (lanmgmt,outside) after-auto source dynamic MGMT-LAN-AP interface&lt;BR /&gt;nat (server,outside) after-auto source dynamic server pat-pool EXT-Service-IP&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;packet-tracer result:&lt;BR /&gt;ASA01# packet-tracer input outside tcp x.x.x.98 2222 192.168.10.11 22&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (lanmgmt,outside) source static MGMT-LAN-AP MGMT-LAN-AP destination static VPN-HOSTS VPN-HOSTS&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface lanmgmt&lt;BR /&gt;Untranslate 192.168.10.11/22 to 192.168.10.11/22&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: lanmgmt&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ASA01# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (lanmgmt) to (outside) source static MGMT-LAN-AP MGMT-LAN-AP&amp;nbsp; destination static VPN-HOSTS VPN-HOSTS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1174, untranslate_hits = 2396&lt;BR /&gt;2 (inside) to (outside) source static MGMT-INSIDE-HOSTS MGMT-INSIDE-HOSTS&amp;nbsp; destination static VPN-HOSTS VPN-HOSTS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;7 (inside) to (outside) source dynamic MGMT-INSIDE-HOSTS interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (server) to (outside) source static SERVER-SSH interface&amp;nbsp; service tcp ssh 2222&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic MGMT-INSIDE-HOSTS interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691483#M14509</guid>
      <dc:creator>RemRem</dc:creator>
      <dc:date>2020-02-21T16:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691515#M14510</link>
      <description>Hi,&lt;BR /&gt;So you've natted SSH (tcp 22) on 192.168.10.11 to port 2222 and you want to access this from the outside network? You should run a packet trace such as this:-&lt;BR /&gt;&lt;BR /&gt;packet-tracer input outside tcp 1.1.1.123 3000 x.x.x.x 2222&lt;BR /&gt;&lt;BR /&gt;Do you have an ACL rule permitting traffic? The ACL needs to reference the real (inside) ip address and the real port (22).&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Mon, 20 Aug 2018 14:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691515#M14510</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-20T14:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691975#M14512</link>
      <description>&lt;P&gt;Hi again,&lt;/P&gt;
&lt;P&gt;There is no ACL so I can't allow the traffic so I would think as there is no ACL it won't be denied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried packet-tracer input outside tcp 1.1.1.123 3000 x.x.x.x 2222:&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop &amp;lt;outside IF public IP&amp;gt; using egress ifc&amp;nbsp; identity&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 08:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691975#M14512</guid>
      <dc:creator>RemRem</dc:creator>
      <dc:date>2018-08-21T08:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691981#M14514</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;By default the ASA has an implicit rule which does not allow traffic to flow from a lower-security interface to a higher-security interface, unless a specific extended ACL is configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create an ACL to specifically allow the traffic, use the real ip address and real port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 08:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3691981#M14514</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-21T08:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692035#M14517</link>
      <description>&lt;P&gt;Okay, I added an ACL to the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any object SERVER-SSH eq ssh (hitcnt=0) 0xc061ee3e&lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 1 extended permit tcp any host 192.168.10.11 eq ssh (hitcnt=0) 0xc061ee3e&lt;BR /&gt;access-list outside_access_in line 2 extended permit ip any any (hitcnt=1) 0x7e78c5c4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried to connect to the host but still no luck. Do I need to also apply an ACL to the internal interface?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 09:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692035#M14517</guid>
      <dc:creator>RemRem</dc:creator>
      <dc:date>2018-08-21T09:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692047#M14522</link>
      <description>No you don't need to add an ACL to the internal interface&lt;BR /&gt;&lt;BR /&gt;The hit count on your output there would indicate that it didn't hit line 1(which is your ssh rule), so something in regard to that configure could be incorrect. Can you upload your full config for review?&lt;BR /&gt;&lt;BR /&gt;What is the output when you re-run packet-tracer after applying the ACL?&lt;BR /&gt;&lt;BR /&gt;What is the output of "show xlate" and "show nat"? please upload</description>
      <pubDate>Tue, 21 Aug 2018 09:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692047#M14522</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-21T09:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692172#M14523</link>
      <description>&lt;P&gt;Here are the packet-tracer and sh nat outputs:&lt;/P&gt;
&lt;P&gt;do you need the complete sh xlate output? Because there are a ton of IPs to edit...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the config:&lt;/P&gt;
&lt;P&gt;ASA Version 9.8(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA1&lt;BR /&gt;enable password $sha512$5000$PQK8KSYe0NmO+h5OBttOig==$aBwdZ7RMs21vTIRUI4SqNg== pbkdf2&lt;BR /&gt;passwd o2NK4e2wFa6gGEjn encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpnpool 10.10.10.129-10.10.10.190 mask 255.255.255.192&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;channel-group 1 mode on&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;channel-group 1 mode on&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;channel-group 2 mode on&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;channel-group 2 mode on&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;channel-group 8 mode active&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;channel-group 8 mode active&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;&amp;nbsp;lacp max-bundle 8&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address x.x.x.98 255.255.255.224 standby x.x.x.99&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2&lt;BR /&gt;&amp;nbsp;lacp max-bundle 8&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.100&lt;BR /&gt;&amp;nbsp;vlan 100&lt;BR /&gt;&amp;nbsp;nameif lanmgmt&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.10.13.129 255.255.255.128 standby 10.10.13.130&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.103&lt;BR /&gt;&amp;nbsp;vlan 103&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.18.1 255.255.255.128 standby 10.10.18.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.105&lt;BR /&gt;&amp;nbsp;vlan 105&lt;BR /&gt;&amp;nbsp;nameif bbb&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.b.b.1 255.255.255.240 standby 10.b.b.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.200&lt;BR /&gt;&amp;nbsp;vlan 200&lt;BR /&gt;&amp;nbsp;nameif ccc&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.c.c.129 255.255.255.192 standby 10.c.c.130&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.201&lt;BR /&gt;&amp;nbsp;vlan 201&lt;BR /&gt;&amp;nbsp;nameif ddd&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.d.d.1 255.255.255.192 standby 10.d.d.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.203&lt;BR /&gt;&amp;nbsp;vlan 203&lt;BR /&gt;&amp;nbsp;nameif eee&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.e.e.193 255.255.255.192 standby 10.e.e.194&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.221&lt;BR /&gt;&amp;nbsp;vlan 221&lt;BR /&gt;&amp;nbsp;nameif fff&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.f.f.209 255.255.255.240 standby 10.f.f.210&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.301&lt;BR /&gt;&amp;nbsp;vlan 301&lt;BR /&gt;&amp;nbsp;nameif ggg&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.g.g.65 255.255.255.192 standby 10.g.g.66&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.450&lt;BR /&gt;&amp;nbsp;vlan 450&lt;BR /&gt;&amp;nbsp;nameif hhh&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.h.h.65 255.255.255.192 standby 10.h.h.66&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.800&lt;BR /&gt;&amp;nbsp;vlan 800&lt;BR /&gt;&amp;nbsp;nameif iii&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.801&lt;BR /&gt;&amp;nbsp;vlan 801&lt;BR /&gt;&amp;nbsp;nameif jjj&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.20.1 255.255.255.0 standby 192.168.20.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.810&lt;BR /&gt;&amp;nbsp;vlan 810&lt;BR /&gt;&amp;nbsp;nameif kkk&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.15.1 255.255.255.0 standby 192.168.15.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.820&lt;BR /&gt;&amp;nbsp;vlan 820&lt;BR /&gt;&amp;nbsp;nameif lll&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.21.1 255.255.255.0 standby 192.168.21.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.821&lt;BR /&gt;&amp;nbsp;vlan 821&lt;BR /&gt;&amp;nbsp;nameif mmm&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.22.1 255.255.255.0 standby 192.168.22.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.828&lt;BR /&gt;&amp;nbsp;vlan 828&lt;BR /&gt;&amp;nbsp;nameif nnn&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.25.1 255.255.255.0 standby 192.168.25.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.850&lt;BR /&gt;&amp;nbsp;vlan 850&lt;BR /&gt;&amp;nbsp;nameif ooo&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.o.o.1 255.255.0.0 standby 172.o.o.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.898&lt;BR /&gt;&amp;nbsp;vlan 898&lt;BR /&gt;&amp;nbsp;nameif server&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0 standby 192.168.10.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.899&lt;BR /&gt;&amp;nbsp;vlan 899&lt;BR /&gt;&amp;nbsp;nameif servermgmt&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.9.1 255.255.255.0 standby 192.168.9.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.906&lt;BR /&gt;&amp;nbsp;vlan 906&lt;BR /&gt;&amp;nbsp;nameif ppp&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.p.p.193 255.255.255.240 standby 10.p.p.194&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.1000&lt;BR /&gt;&amp;nbsp;vlan 1000&lt;BR /&gt;&amp;nbsp;nameif qqq&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.q.q.1 255.255.255.0 standby 172.q.q.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2.1254&lt;BR /&gt;&amp;nbsp;vlan 1254&lt;BR /&gt;&amp;nbsp;nameif rrr&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.r.r.1 255.255.252.0 standby 172.r.r.2&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel8&lt;BR /&gt;&amp;nbsp;description LAN Failover Interface&lt;BR /&gt;&amp;nbsp;lacp max-bundle 8&lt;BR /&gt;!&lt;BR /&gt;banner login ------------------------------------WARNING-------------------------------&lt;BR /&gt;banner login ---------------------------------------------------------------------------&lt;BR /&gt;boot system disk0:/asa982-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network MGMT-INSIDE-HOSTS&lt;BR /&gt;&amp;nbsp;range 10.10.18.0 255.255.255.128&lt;BR /&gt;object network VPN-HOSTS&lt;BR /&gt;&amp;nbsp;range 10.110.18.128 255.255.255.192&lt;BR /&gt;object network XXX-NET&lt;BR /&gt;&amp;nbsp;range 10.10.2.0 255.255.255.0&lt;BR /&gt;object network YYY-NET&lt;BR /&gt;&amp;nbsp;range 10.10.1.0 255.255.255.0&lt;BR /&gt;object network MGMT-LAN-AP&lt;BR /&gt;&amp;nbsp;range 10.10.13.128 255.255.255.128&lt;BR /&gt;object network MMM&lt;BR /&gt;&amp;nbsp;range 192.168.22.1 255.255.255.0&lt;BR /&gt;object network CCC&lt;BR /&gt;&amp;nbsp;range 10.c.c.128 255.255.255.192&lt;BR /&gt;object network EXT-Service-IP&lt;BR /&gt;&amp;nbsp;host x.x.x.119&lt;BR /&gt;object network OOO&lt;BR /&gt;&amp;nbsp;range 172.o.o.0 255.255.0.0&lt;BR /&gt;object network servermgmt&lt;BR /&gt;&amp;nbsp;range 192.168.9.0 255.255.255.0&lt;BR /&gt;object network server&lt;BR /&gt;&amp;nbsp;range 192.168.10.0 255.255.255.0&lt;BR /&gt;object network RRR&lt;BR /&gt;&amp;nbsp;range 172.r.r.0 255.255.252.0&lt;BR /&gt;object network KKK&lt;BR /&gt;&amp;nbsp;range 192.168.15.0 255.255.255.0&lt;BR /&gt;object network III&lt;BR /&gt;&amp;nbsp;range 192.168.1.0 255.255.255.0&lt;BR /&gt;object network NNN&lt;BR /&gt;&amp;nbsp;range 192.168.25.0 255.255.255.0&lt;BR /&gt;object network QQQ&lt;BR /&gt;&amp;nbsp;range 172.q.q.0 255.255.255.0&lt;BR /&gt;object network LLL&lt;BR /&gt;&amp;nbsp;range 192.168.21.0 255.255.255.0&lt;BR /&gt;object network HHH&lt;BR /&gt;&amp;nbsp;range 10.h.h.64 255.255.255.192&lt;BR /&gt;object network JJJ&lt;BR /&gt;&amp;nbsp;range 192.168.20.0 255.255.255.0&lt;BR /&gt;object network SERVER-SSH&lt;BR /&gt;&amp;nbsp;host 192.168.10.11&lt;BR /&gt;&amp;nbsp;description otrum Server&lt;BR /&gt;access-list Split_Tunnel_List remark Networks behind ASA&lt;BR /&gt;access-list Split_Tunnel_List standard permit 10.17.68.0 255.255.255.128&lt;BR /&gt;access-list Split_Tunnel_List standard permit 10.17.63.128 255.255.255.128&lt;BR /&gt;access-list XXX-NET remark Network behind xxx&lt;BR /&gt;access-list XXX-NET extended permit ip 10.10.18.0 255.255.255.128 10.10.2.0 255.255.255.0&lt;BR /&gt;access-list XXX-NET extended permit ip 10.10.33.128 255.255.255.128 10.10.2.0 255.255.255.0&lt;BR /&gt;access-list XXX-NET extended permit ip 10.10.2.0 255.255.255.0 10.10.13.128 255.255.255.128&lt;BR /&gt;access-list XXX-NET extended permit ip 10.10.2.0 255.255.255.0 10.10.18.0 255.255.255.128&lt;BR /&gt;access-list YYY-NET remark Network behind yyy&lt;BR /&gt;access-list YYY-NET extended permit ip 10.10.13.128 255.255.255.128 10.10.1.0 255.255.255.0&lt;BR /&gt;access-list YYY-NET extended permit ip 10.10.1.0 255.255.255.0 10.10.13.128 255.255.255.128&lt;BR /&gt;access-list YYY-NET extended permit ip 10.10.1.0 255.255.255.0 10.10.18.0 255.255.255.128&lt;BR /&gt;access-list YYY-NET extended permit ip 10.10.18.0 255.255.255.128 10.10.1.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SERVER-SSH eq ssh&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list AUTH message 315011&lt;BR /&gt;logging list AUTH message 113005&lt;BR /&gt;logging list AUTH message 611103&lt;BR /&gt;logging list AUTH message 611102&lt;BR /&gt;logging list AUTH message 611101&lt;BR /&gt;logging list AUTH message 605005&lt;BR /&gt;logging list AUTH message 605004&lt;BR /&gt;logging list AUTH message 111008&lt;BR /&gt;logging list AUTH message 111009&lt;BR /&gt;logging buffer-size 100000&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap AUTH&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging facility 19&lt;BR /&gt;logging host lanmgmt 10.10.13.133&lt;BR /&gt;logging message 315011 level debugging&lt;BR /&gt;logging message 113005 level debugging&lt;BR /&gt;logging message 611103 level debugging&lt;BR /&gt;logging message 611102 level debugging&lt;BR /&gt;logging message 611101 level debugging&lt;BR /&gt;logging message 605005 level debugging&lt;BR /&gt;logging message 605004 level debugging&lt;BR /&gt;logging message 111008 level debugging&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu lanmgmt 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu bbbb 1500&lt;BR /&gt;mtu ccc 1500&lt;BR /&gt;mtu ddd 1500&lt;BR /&gt;mtu eee 1500&lt;BR /&gt;mtu fff 1500&lt;BR /&gt;mtu ggg 1500&lt;BR /&gt;mtu hhhh 1500&lt;BR /&gt;mtu iii 1500&lt;BR /&gt;mtu jjj 1500&lt;BR /&gt;mtu kkke 1500&lt;BR /&gt;mtu lll 1500&lt;BR /&gt;mtu mmm 1500&lt;BR /&gt;mtu nnn 1500&lt;BR /&gt;mtu ooo 1500&lt;BR /&gt;mtu server 1500&lt;BR /&gt;mtu servermgmt 1500&lt;BR /&gt;mtu ppp 1500&lt;BR /&gt;mtu qqq 1500&lt;BR /&gt;mtu rrr 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface interface Port-channel8&lt;BR /&gt;failover interface ip interface 10.10.18.225 255.255.255.224 standby 10.10.18.226&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp outside x.x.x.119 mac.mac.mac alias&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (lanmgmt,outside) source static MGMT-LAN-AP MGMT-LAN-AP destination static VPN-HOSTS VPN-HOSTS&lt;BR /&gt;nat (inside,outside) source static MGMT-INSIDE-HOSTS MGMT-INSIDE-HOSTS destination static VPN-HOSTS VPN-HOSTS&lt;BR /&gt;nat (lanmgmt,outside) source static MGMT-LAN-AP MGMT-LAN-AP destination static XXX-NET XXX-NET&lt;BR /&gt;nat (lanmgmt,outside) source static MGMT-LAN-AP MGMT-LAN-AP destination static SERVER-NET YYY-NET&lt;BR /&gt;nat (inside,outside) source static MGMT-INSIDE-HOSTS MGMT-INSIDE-HOSTS destination static XXX-NET LORD-NET&lt;BR /&gt;nat (inside,outside) source static MGMT-INSIDE-HOSTS MGMT-INSIDE-HOSTS destination static YYY-NET SERVER-NET&lt;BR /&gt;nat (inside,outside) source dynamic MGMT-INSIDE-HOSTS interface&lt;BR /&gt;!&lt;BR /&gt;object network MGMT-INSIDE-HOSTS&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network SERVER-SSH&lt;BR /&gt;&amp;nbsp;nat (server,outside) static interface service tcp ssh 2222&lt;BR /&gt;!&lt;BR /&gt;nat (server,servermgmt) after-auto source dynamic otrum interface&lt;BR /&gt;nat (lanmgmt,outside) after-auto source dynamic MGMT-LAN-AP interface&lt;BR /&gt;nat (ccc,outside) after-auto source dynamic CCC pat-pool EXT-Service-IP&lt;BR /&gt;nat (ddd,outside) after-auto source dynamic DDD pat-pool EXT-Service-IP&lt;BR /&gt;nat (eee,outside) after-auto source dynamic EEE pat-pool EXT-Service-IP&lt;BR /&gt;nat (servermgmt,outside) after-auto source dynamic servermgmt pat-pool EXT-Service-IP&lt;BR /&gt;nat (fff,outside) after-auto source dynamic FFF pat-pool EXT-Service-IP&lt;BR /&gt;nat (ggg,outside) after-auto source dynamic GGG pat-pool EXT-Service-IP&lt;BR /&gt;nat (hhh,outside) after-auto source dynamic HHH pat-pool EXT-Service-IP&lt;BR /&gt;nat (iii,outside) after-auto source dynamic III pat-pool EXT-Service-IP&lt;BR /&gt;nat (jjj,outside) after-auto source dynamic JJJ pat-pool EXT-Service-IP&lt;BR /&gt;nat (kkk,outside) after-auto source dynamic KKK pat-pool EXT-Service-IP&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x.97 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;aaa-server TAC protocol tacacs+&lt;BR /&gt;aaa-server TAC (outside) host x.x.x.3&lt;BR /&gt;&amp;nbsp;key *****&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console TAC LOCAL&lt;BR /&gt;aaa authentication enable console TAC LOCAL&lt;BR /&gt;aaa authentication http console TAC LOCAL&lt;BR /&gt;aaa accounting command TAC&lt;BR /&gt;aaa accounting enable console TAC&lt;BR /&gt;aaa accounting ssh console TAC&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http x.x.x.0 255.255.240.0 outside&lt;BR /&gt;snmp-server host lanmgmt 10.10.13.133 poll community ***** version 2c&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;sysopt noproxyarp outside&lt;BR /&gt;sysopt noproxyarp lanmgmt&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;sysopt noproxyarp ccwifi&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set REMOTE_ACCESS_TS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set LINUX-IPSEC esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map REMOTE_ACCESS_DYNMAP 1 set ikev1 transform-set REMOTE_ACCESS_TS&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 10 match address LORD-NET&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 10 set peer x.x.x.4&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 10 set ikev1 transform-set LINUX-IPSEC&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 10 set reverse-route&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 20 match address SERVER-NET&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 20 set peer x.x.x.5&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 20 set ikev1 transform-set LINUX-IPSEC&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 20 set reverse-route&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP 65535 ipsec-isakmp dynamic REMOTE_ACCESS_DYNMAP&lt;BR /&gt;crypto map REMOTE_ACCESS_MAP interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 7200&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh x.x.x.0 255.255.240.0 outside&lt;BR /&gt;ssh 10.10.13.128 255.255.255.128 lanmgmt&lt;BR /&gt;ssh 10.10.18.0 255.255.255.128 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh cipher encryption high&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 10&lt;BR /&gt;&lt;BR /&gt;dhcpd auto_config lanmgmt&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.h.h.74-10.h.h.126 hhh&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface hhh&lt;BR /&gt;dhcpd option 3 ip 10.h.h.65 interface hhh&lt;BR /&gt;dhcpd enable hhh&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.20.10-192.168.20.250 jjj&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface jjj&lt;BR /&gt;dhcpd option 3 ip 192.168.20.1 interface jjj&lt;BR /&gt;dhcpd enable jjj&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.22.10-192.168.22.250 mmm&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface mmm&lt;BR /&gt;dhcpd option 3 ip 192.168.22.1 interface mmm&lt;BR /&gt;dhcpd enable mmm&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.o.o.21-172.o.o+1.20 ooo&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface ooo&lt;BR /&gt;dhcpd option 3 ip 172.o.o.1 interface ooo&lt;BR /&gt;dhcpd enable ooo&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.10.13.133&lt;BR /&gt;group-policy ASA1 internal&lt;BR /&gt;group-policy ASA1 attributes&lt;BR /&gt;&amp;nbsp;vpn-idle-timeout 1440&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value Split_Tunnel_List&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password pw privilege 15&lt;BR /&gt;username root password pw privilege 15&lt;BR /&gt;tunnel-group ASA1 type remote-access&lt;BR /&gt;tunnel-group ASA1 general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpnpool&lt;BR /&gt;&amp;nbsp;authentication-server-group TAC LOCAL&lt;BR /&gt;&amp;nbsp;default-group-policy FRARI&lt;BR /&gt;tunnel-group ASA1 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group x.x.x.4 type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.x.4 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group x.x.x.5 type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.x.5 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:66bbe06f6ef62e66c9fd5e8a0ec8e8fe&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 13:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692172#M14523</guid>
      <dc:creator>RemRem</dc:creator>
      <dc:date>2018-08-21T13:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692320#M14524</link>
      <description>Hi,&lt;BR /&gt;I cannot see an "access-group" to bind the ACL to the outside interface in the configuration. Try binding the ACL to the interface, if still not working re-run packet-tracer and upload the output.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 21 Aug 2018 16:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692320#M14524</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-21T16:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692741#M14525</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have added this:&lt;/P&gt;
&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still not working. Packet-tracer output:&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop x.x.x.98 using egress ifc&amp;nbsp; identity&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 22 Aug 2018 08:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692741#M14525</guid>
      <dc:creator>RemRem</dc:creator>
      <dc:date>2018-08-22T08:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692778#M14526</link>
      <description>The output of packet tracer would usually indicate what nat rule, acl was matched....it doesn't here.&lt;BR /&gt;&lt;BR /&gt;What values are you putting in the packet-tracer command? Can you re-run the packet-tracer and append "detailed" at the end. Provide the full output&lt;BR /&gt;&lt;BR /&gt;Can you provide the output of "show xlate | inc &amp;lt;external-ip-address&amp;gt;", see if it's actually matching.</description>
      <pubDate>Wed, 22 Aug 2018 09:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3692778#M14526</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-22T09:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3693040#M14527</link>
      <description>&lt;P&gt;Here is the complete output:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA1# packet-tracer input outside tcp 8.8.8.8 3000 x.x.x.98 2222 de$&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffa00658c10, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2718, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop x.x.x.98 using egress ifc&amp;nbsp; identity&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ff9ff8ec930, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=243, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffa0065a040, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=484, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 22 Aug 2018 15:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3693040#M14527</guid>
      <dc:creator>RemRem</dc:creator>
      <dc:date>2018-08-22T15:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT on ASA5508 not working</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3693767#M14528</link>
      <description>&lt;P&gt;Okay, as the ACLs did not help I finally removed all other NAT rules and of course, it worked fine.&lt;/P&gt;
&lt;P&gt;Then I put the other rules back in one by one.&lt;/P&gt;
&lt;P&gt;As it turns out, my static PAT only works if it is the first NAT rule (in the sh nat order).&lt;/P&gt;
&lt;P&gt;How can I get it to always be #1 or is there any other workaround?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 14:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-on-asa5508-not-working/m-p/3693767#M14528</guid>
      <dc:creator>RemRem</dc:creator>
      <dc:date>2018-08-23T14:59:52Z</dc:date>
    </item>
  </channel>
</rss>

