<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It definitely looks like the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017797#M147603</link>
    <description>&lt;P&gt;It definitely looks like the ASA is dropping it although there is no reason given as to why&lt;/P&gt;
&lt;P&gt;790: 07:23:35.273575&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 104.137.90.176.65498 &amp;gt; xx.xx.xx.xx.888: S 3047924272:3047924272(0) win 8192 &amp;lt;mss 1260,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you paste the packet-tracer output and the latest sanitized config again? Also, was there any syslogs that showed up on the ASA when this failed?&lt;/P&gt;</description>
    <pubDate>Tue, 24 Jan 2017 14:23:34 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-01-24T14:23:34Z</dc:date>
    <item>
      <title>Port Forwarding ASA5505 packets dropping</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017775#M147581</link>
      <description>&lt;P&gt;Outbound traffic works but inbound does not. I have checked my ACL and it looks correct, but I am still not seeing what I missed. I have attached our current running-config as well as a screenshot of the Packet Trace utility. Below is the detailed packet-tracer results.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "packet-tracer input outside tcp 8.8.8.8 888 192.168.1.88 888 detailed"&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit object FrontelPort1 any object FRONTELSVR1 &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd003f6b8, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=7, user_data=0xca0e8a80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=888, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=192.168.1.88, mask=255.255.255.255, port=888, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcba010a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=1193646144, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc08d5a0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=612753499, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcca5dc28, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=373410, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network FRONTELSVR1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 888 888 &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xd06d4bb0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=2, user_data=0xd04266d8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=192.168.1.88, mask=255.255.255.255, port=888, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=inside&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017775#M147581</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2019-03-12T08:47:48Z</dc:date>
    </item>
    <item>
      <title>According to this statement,</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017776#M147582</link>
      <description>&lt;P&gt;According to this statement,&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network FRONTELSVR1
 nat (inside,outside) static interface service tcp 888 888 &lt;/PRE&gt;
&lt;P&gt;Your server at 192.168.1.88 is translated to your outside interface ip address when tcp port 888 is used. Your packet tracer is failing because the ASA determines that there are asymmetric NAT rules being hit in the return path (hence reverse path failure or RPF). Your packet tracer should ideally be the below statement as outside users will hit the public ip address to access the server:&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 888 &amp;lt;outside-interface-ip&amp;gt; 888 detailed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 13:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017776#M147582</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-18T13:36:46Z</dc:date>
    </item>
    <item>
      <title>Thank you for the quick reply</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017777#M147583</link>
      <description>&lt;P&gt;Thank you for the quick reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Its been a while since I worked in this environment, yes I can see the un-NAT and NAT when using the packet-tracer input outside tcp 8.8.8.8 888 &amp;lt;outside-interface-ip&amp;gt; 888 detailed statement.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Why would this stop us from being able to telnet into the server using the public address on port 888? (telnet xx.xx.xx.xx 888)&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 13:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017777#M147583</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-18T13:57:08Z</dc:date>
    </item>
    <item>
      <title>Telnet should work if the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017778#M147584</link>
      <description>&lt;P&gt;Telnet should work if the packet-tracer showed allow all the way through to the inside interface. Can you paste the output here?&lt;/P&gt;
&lt;P&gt;You may want to apply a capture on the outside and inside interface to capture the entire transaction through the ASA. I would apply a capture like this:&lt;/P&gt;
&lt;P&gt;cap capo interface outside match ip host &amp;lt;source ip address&amp;gt; any&lt;/P&gt;
&lt;P&gt;cap capi interface inside match ip host &amp;lt;source ip address&amp;gt; any&lt;/P&gt;
&lt;P&gt;Source ip address is the client's ip address on the internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 14:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017778#M147584</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-18T14:41:37Z</dc:date>
    </item>
    <item>
      <title>There's quite a bit of nat in</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017779#M147585</link>
      <description>&lt;P&gt;There's quite a bit of nat in there&amp;nbsp;but I believe you need to set it up with after-auto parameter as in the example below.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;nat (inside,outside) after-auto source dynamic Inside-Network interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;That shows up after your specific nat rules for the port forwarding.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 14:45:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017779#M147585</guid>
      <dc:creator>emily00001</dc:creator>
      <dc:date>2017-01-18T14:45:04Z</dc:date>
    </item>
    <item>
      <title>Hopefully I did this right:</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017780#M147586</link>
      <description>&lt;P&gt;Hopefully I did this right:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "packet-tracer input outside tcp 8.8.8.8 888 xx.xx.xx.xx 888 detailed"&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd0712e80, priority=13, domain=capture, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=15533, user_data=0xd0712d40, cs_id=0x0, l3_type=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc087cc8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=10642429583, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network FRONTELSVR1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 888 888 &lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate xx.xx.xx.xx/888 to 192.168.1.88/888&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_8 any object FRONTELSVR1 &lt;BR /&gt;object-group service DM_INLINE_SERVICE_8&lt;BR /&gt;&amp;nbsp;service-object object FrontelPort1 &lt;BR /&gt;&amp;nbsp;service-object tcp destination eq telnet &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd003f6b8, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=0, user_data=0xca0e8a80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=888, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=192.168.1.88, mask=255.255.255.255, port=888, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcba010a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=1197004907, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc08d5a0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=614473460, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcca5dc28, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=373713, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network FRONTELSVR1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 888 888 &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xd06d4bb0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=6, user_data=0xd04266d8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=192.168.1.88, mask=255.255.255.255, port=888, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=inside&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xcf077c90, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=613755692, user_data=0xcf06e370, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=inside&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcba010a0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=1197004909, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc064370, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=614036763, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 12&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xcf077ef8, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=614737321, user_data=0xcf06e370, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=outside&lt;BR /&gt;&lt;BR /&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 614835307, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 14:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017780#M147586</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-18T14:50:00Z</dc:date>
    </item>
    <item>
      <title>Packet-tracer looks good. Can</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017781#M147587</link>
      <description>&lt;P&gt;Packet-tracer looks good. Can you check if the capture on inside and outside interface show 2 way traffic?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 15:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017781#M147587</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-18T15:32:54Z</dc:date>
    </item>
    <item>
      <title>How can I check?</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017782#M147588</link>
      <description>&lt;P&gt;How can I check?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 15:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017782#M147588</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-18T15:34:10Z</dc:date>
    </item>
    <item>
      <title>Mentioned it in an earlier</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017783#M147589</link>
      <description>&lt;P&gt;Mentioned it in an earlier post:&lt;/P&gt;
&lt;P&gt;You may want to apply a capture on the outside and inside interface to capture the entire transaction through the ASA. I would apply a capture like this:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;cap capo interface outside match ip host &amp;lt;source ip address&amp;gt; any&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;cap capi interface inside match ip host &amp;lt;source ip address&amp;gt; any&lt;/PRE&gt;
&lt;P&gt;Source ip address is the client's ip address on the internet. After sending traffic, check the captures using:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show capture capo&lt;BR /&gt;show capture capi&lt;/PRE&gt;
&lt;P&gt;More info on capture here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118097-configure-asa-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 15:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017783#M147589</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-18T15:40:39Z</dc:date>
    </item>
    <item>
      <title>I get 3 capi responses on</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017784#M147590</link>
      <description>&lt;P&gt;I get 3 capi responses on port 888 from an internal telnet to out outside address, but nothing on the capo for port 888&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show capture capi"&lt;BR /&gt;&lt;BR /&gt;3 packets captured&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; 1: 08:15:29.396631&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.1.148.64584 &amp;gt; xx.xx.xx.xx.888: S 820795542:820795542(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;&amp;nbsp; 2: 08:15:32.395853&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.1.148.64584 &amp;gt; xx.xx.xx.xx.888: S 820795542:820795542(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;&amp;nbsp; 3: 08:15:38.395990&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.1.148.64584 &amp;gt; xx.xx.xx.xx.888: S 820795542:820795542(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt; &lt;BR /&gt;3 packets shown&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 16:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017784#M147590</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-18T16:43:53Z</dc:date>
    </item>
    <item>
      <title>Are you trying to access the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017785#M147591</link>
      <description>&lt;P&gt;Are you trying to access the server from outside or from inside? From your captures looks like the source is an internal ip address (192.168.1.148) and destination is the ASA public ip address on the outside (xx.xx.xx.xx). This wont work, you cannot access resources on another interface of the ASA while coming in from a different interface.&lt;/P&gt;
&lt;P&gt;Maybe I have mistaken your topology, but you had mentioned that access to the server was not working from the outside correct. Can you send some traffic from a host on the internet to the ASA's public ip address on port 888? Clear the captures using command "clear cap /all" before you test it.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 20:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017785#M147591</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-18T20:52:28Z</dc:date>
    </item>
    <item>
      <title>From the outside. I was</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017786#M147592</link>
      <description>&lt;P&gt;From the outside. I was testing from the inside thinking it would work. However, we cant connect even connect from another public address.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 23:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017786#M147592</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-18T23:19:27Z</dc:date>
    </item>
    <item>
      <title>Could you capture the packets</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017787#M147593</link>
      <description>&lt;P&gt;Could you capture the packets when testing from outside? Your config looks ok and packet-tracer allows the packet to go all the way from outside to inside. We need to see if packets are actually being blocked by the ASA or if there is another reason it is getting dropped.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 07:05:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017787#M147593</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-19T07:05:34Z</dc:date>
    </item>
    <item>
      <title>To make sure I set up the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017788#M147594</link>
      <description>&lt;P&gt;To make sure I set up the capture correctly:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;no capture capo&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;no capture capi&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;cap capo interface outside match ip host 104.137.90.176 any&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;cap capi interface inside match ip host 104.137.90.176 any&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;clear capture /all&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where 104.137.90.176 is the external address I will be testing from.&amp;nbsp; (Should I put anything in the &lt;STRONG&gt;&lt;EM&gt;any&lt;/EM&gt;&lt;/STRONG&gt; place?)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Then I would be sending &lt;EM&gt;telnet xx.xx.xx.xx 888&amp;nbsp;&lt;/EM&gt;from 104.137.90.176 to my public IP address xx.xx.xx.xx. Is this correct?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 14:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017788#M147594</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-19T14:27:58Z</dc:date>
    </item>
    <item>
      <title>I am not seeing any traffic</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017789#M147595</link>
      <description>&lt;P&gt;I am not seeing any traffic on port 888. It looks like only traffic for Teamviewer from my home PC to my work PC.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am confused as to why I am not even seeing the telnet attempt on port 888. Any additional thoughts?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 17:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017789#M147595</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-19T17:08:51Z</dc:date>
    </item>
    <item>
      <title>Not sure, we should see at</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017790#M147596</link>
      <description>&lt;P&gt;Not sure, we should see at least the TCP syn packet reaching the ASA from your ip address. Could it be possible that your ISP or gateway router is not allowing the port 888 across?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 01:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017790#M147596</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-20T01:38:17Z</dc:date>
    </item>
    <item>
      <title>I can check in the morning. I</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017791#M147597</link>
      <description>&lt;P&gt;I can check in the morning. I know at the office end (outside interface) is open. I will check from a different ISP/Location. Also, was my capture setup correct?&amp;nbsp; (see above)&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 02:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017791#M147597</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-20T02:04:12Z</dc:date>
    </item>
    <item>
      <title>Yes, capture was correct. I</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017792#M147598</link>
      <description>&lt;P&gt;Yes, capture was correct. I would recommend the following capture so that you do not get your teamviewer packets in the capture also:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;no capture capo&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;no capture capi&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;cap capo interface outside match tcp host &amp;lt;your public ip&amp;gt; host &amp;lt;ASA public ip&amp;gt; eq 888&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;cap capi interface inside match tcp host &amp;lt;your public ip&amp;gt; host 192.168.1.88 eq 888&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;clear capture /all&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;This will only capture the traffic to the server from your PC.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 03:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017792#M147598</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-20T03:14:13Z</dc:date>
    </item>
    <item>
      <title>Looks like the ISP is not</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017793#M147599</link>
      <description>&lt;P&gt;Looks like the ISP is not blocking port 888, but the packet is not showing on the inside capture.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show capture capo"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1: 07:22:29.641064&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 104.137.90.176.60744 &amp;gt; xx.xx.xx.xx.888: S 3035968005:3035968005(0) win 8192 &amp;lt;mss 1260,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 07:22:32.641202&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 104.137.90.176.60744 &amp;gt; xx.xx.xx.xx.888: S 3035968005:3035968005(0) win 8192 &amp;lt;mss 1260,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 07:22:38.641904&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 104.137.90.176.60744 &amp;gt; xx.xx.xx.xx.888: S 3035968005:3035968005(0) win 8192 &amp;lt;mss 1260,nop,nop,sackOK&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 07:22:50.692942&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 104.137.90.176.60744 &amp;gt; xx.xx.xx.xx.888: R 0:0(0) win 0 &lt;BR /&gt;4 packets shown&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Result of the command: "show capture capi"&lt;BR /&gt;&lt;BR /&gt;0 packet captured&lt;BR /&gt;&lt;BR /&gt;0 packet shown&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 13:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017793#M147599</guid>
      <dc:creator>staylor2112</dc:creator>
      <dc:date>2017-01-20T13:28:23Z</dc:date>
    </item>
    <item>
      <title>Strange. Considering both the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017794#M147600</link>
      <description>&lt;P&gt;Strange. Considering both the captures are correctly configured, looks like the ASA is not forwarding the packet to the inside interface. Can you attach the "show capture" and packet-tracer output to confirm that nothing has changed from before.&lt;/P&gt;
&lt;P&gt;A few other troubleshooting steps you can try:&lt;/P&gt;
&lt;P&gt;1) check the local buffer syslog for anything regarding this transaction that could indicate that the ASA dropped it.&lt;/P&gt;
&lt;P&gt;2) Apply an ASP drop capture - this will capture all the packets the ASA drops. Steps to do this are:&lt;/P&gt;
&lt;P&gt;a) Command "cap capasp type asp all"&lt;/P&gt;
&lt;P&gt;b) Send traffic&lt;/P&gt;
&lt;P&gt;c) show cap capasp | in &amp;lt;your public ip address&amp;gt;&lt;/P&gt;
&lt;P&gt;If you are seeing this, you may get a reason for the drop in the last output. This would help in investigation on the packet drop.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 23:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5505-packets-dropping/m-p/3017794#M147600</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-20T23:40:47Z</dc:date>
    </item>
  </channel>
</rss>

