<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Are you using the IP or a URL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873183#M154214</link>
    <description>&lt;P&gt;Are you using the IP or a URL when accessing the server from outside? &amp;nbsp;I think there might be some stale xlate entries that are getting in the way here. &amp;nbsp;Try clearing the xlate table and perhaps even the connections&lt;/P&gt;
&lt;P&gt;clear xlate local 10.255.170.4&lt;/P&gt;
&lt;P&gt;clear xlate global 66.152.125.244&lt;/P&gt;
&lt;P&gt;clear conn&lt;/P&gt;
&lt;P&gt;If this is still not working I suggest doing a reload of the ASA.&lt;/P&gt;
&lt;P&gt;I suggested removing nat-control as it no longer used in newer versions and really doesn't add that much more security.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 05 May 2016 15:02:43 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2016-05-05T15:02:43Z</dc:date>
    <item>
      <title>ASA 5510 Public Server Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873177#M154208</link>
      <description>&lt;P&gt;I have been tasked with some ASA configuration coming in a few weeks, and to test out some configuration options I have setup a web server on my local network which I would like to be able to access from via WAN with one of our static IP that ISP has given us.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Info:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ASA: 8.2&lt;/P&gt;
&lt;P&gt;ASM: 6.2&lt;/P&gt;
&lt;P&gt;Static Block from ISP:&amp;nbsp;xx.152.125.240/29&lt;/P&gt;
&lt;P&gt;Default Gateway (Static route to): xx.152.125.241&lt;/P&gt;
&lt;P&gt;Ethernet 0/0 (outside) - WAN - xx.152.125.243 255.255.255.248&lt;/P&gt;
&lt;P&gt;Ethernet 0/3 (inside) - LAN - 10.255.170.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Attempt:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I first attempted to setup the NAT &amp;amp; ACL rules manually, without luck. So I deleted those and simply used the "Public Servers" feature setup like so:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Private Interface&lt;/STRONG&gt;: inside&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Private IP Address&lt;/STRONG&gt;: 10.255.170.4&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Service&lt;/STRONG&gt;: tcp/8080, tcp/http, tcp/https&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Public Interface&lt;/STRONG&gt;: outside&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Public IP Address&lt;/STRONG&gt;: xx.152.125.244&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This created the same exact rules I had setup manually the first time that hadn't worked, so I had little faith. Little to my surprise I could not hit the server via a browser. All other network functionality works great, and internally I can hit 10.255.170.4 server from a browser on a LAN workstation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Troubleshooting:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I usually work via ASDM because I'm just starting to dig through the CLI references. I however dropped into CLI to perform the packet trace:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;# packet-tracer input outside tcp 1.2.3.4 8080 xx.152.125.244 8080&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) xx.152.125.244 10.255.170.4 netmask 255.255.255.255 &lt;BR /&gt;nat-control&lt;BR /&gt; match ip inside host 10.255.170.4 outside any&lt;BR /&gt; static translation to xx.152.125.244&lt;BR /&gt; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate xx.152.125.244/0 to 10.255.170.4/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group from_wan in interface outside&lt;BR /&gt;access-list from_wan extended permit tcp any host xx.152.125.244 object-group DM_INLINE_TCP_0 &lt;BR /&gt;object-group service DM_INLINE_TCP_0 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq 8080&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; &lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) xx.152.125.244 10.255.170.4 netmask 255.255.255.255 &lt;BR /&gt;nat-control&lt;BR /&gt; match ip inside host 10.255.170.4 outside any&lt;BR /&gt; static translation to xx.152.125.244&lt;BR /&gt; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) xx.152.125.244 10.255.170.4 netmask 255.255.255.255 &lt;BR /&gt;nat-control&lt;BR /&gt; match ip inside host 10.255.170.4 outside any&lt;BR /&gt; static translation to xx.152.125.244&lt;BR /&gt; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt; &lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 350070, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;So given that the packet is not dropped, why would I not be able to hit the server via a browser to the public IP (xx.152.125.244:8080)? I feel like I'm missing something very simple but can't put my finger on it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any assistance is much appreciated!&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873177#M154208</guid>
      <dc:creator>ECCsimmons</dc:creator>
      <dc:date>2019-03-12T07:42:35Z</dc:date>
    </item>
    <item>
      <title>Where are you testing from?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873178#M154209</link>
      <description>&lt;P&gt;Where are you testing from? Are you testing from the local network and trying to go to the public IP or are you originating traffic from the WAN / Internet?&lt;/P&gt;
&lt;P&gt;Looks like the traffic is being matched on a VPN tunnel. &amp;nbsp;Are the relevant IPs allowed through the tunnel (encryption domain)?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Type: VPN&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Subtype: ipsec-tunnel-flow&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Trying to hit the public IP that the ASA expects to see on the outside interface from the inside LAN will never work.&lt;/P&gt;
&lt;P&gt;If you are testing from the outside then possible issues could be that the Server is not listening on port 8080, or there is a routing issue on the server sending traffic to the wrong default gateway.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 10:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873178#M154209</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-05-05T10:22:39Z</dc:date>
    </item>
    <item>
      <title>I was testing both on-site</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873179#M154210</link>
      <description>&lt;P&gt;I was testing both on-site with the private IP, and offsite with the public IP. I overlooked the VPN in there, thanks for that. I've since made changes to disable VPN as we no longer use it, and it's no longer a factor in the packet tracer.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Still no headway though, I do know the server is listening on 8080 as it responds when I hit it with the private IP on the LAN. The server's default gateway is 10.255.170.1(inside interface), and the outside default gateway is the normal xx.152.125.241.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here's the running-config.. any other info I can provide just let me know.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;names&lt;BR /&gt;name 10.255.170.0 XXXX_net&lt;BR /&gt;name xx.152.125.243 XXXX_wan description WAN&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description ISP/WAN&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address XXXX_wan 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description LAN&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.255.170.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; description Management Interface&lt;BR /&gt; shutdown&lt;BR /&gt; nameif MGMT&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.16.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup MGMT&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name XXXX.office&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object ip&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network bomgar-subnet&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object ip &lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt; service-object ip &lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt;object-group service DM_INLINE_TCP_0 tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;access-list from_lan extended permit ip any any &lt;BR /&gt;access-list from_lan extended permit gre any any &lt;BR /&gt;access-list from_lan extended permit icmp any any &lt;BR /&gt;access-list wan_xmit extended permit ip any any &lt;BR /&gt;access-list from_wan extended permit tcp any host xx.152.125.244 object-group DM_INLINE_TCP_0 &lt;BR /&gt;access-list from_wan extended permit icmp any any &lt;BR /&gt;access-list from_wan extended permit udp any any eq isakmp &lt;BR /&gt;access-list from_wan extended permit tcp any any object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list from_wan extended permit object-group DM_INLINE_SERVICE_1 any interface outside inactive &lt;BR /&gt;access-list from_wan extended permit object-group DM_INLINE_SERVICE_2 any xx.152.125.240 255.255.255.248 inactive &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip XXXX_net 255.255.255.0 XXXX_other_net 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip XXXX_net 255.255.255.0 10.255.170.240 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.255.170.240 255.255.255.240 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.255.170.192 255.255.255.192 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.255.170.208 255.255.255.248 &lt;BR /&gt;access-list XXXX-RA_splitTunnelAcl standard permit XXXX_net 255.255.255.0 &lt;BR /&gt;access-list outside_nat0_outbound extended permit ip host XXXX_wan XXXX_net 255.255.255.0 &lt;BR /&gt;access-list VPN_RA_splitTunnelAcl standard permit XXXX_net 255.255.255.0 &lt;BR /&gt;access-list Bomgar extended permit object-group DM_INLINE_PROTOCOL_1 any host 10.255.170.169 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;ip local pool RA-IP-Pool 10.255.170.240-10.255.170.250 mask 255.255.255.0&lt;BR /&gt;ip local pool NEW-POOL 10.255.170.220-10.255.170.230 mask 255.255.255.0&lt;BR /&gt;ip local pool WIN-POOL 10.255.170.210-10.255.170.215 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (outside) 0 access-list outside_nat0_outboundF&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 XXXX_net 255.255.255.0&lt;BR /&gt;static (inside,outside) xx.152.125.244 10.255.170.4 netmask 255.255.255.255 &lt;BR /&gt;access-group from_wan in interface outside&lt;BR /&gt;access-group wan_xmit out interface outside&lt;BR /&gt;access-group from_lan in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xx.152.125.241 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http XXXX_other_net 255.255.255.0 inside&lt;BR /&gt;http XXXX_net 255.255.255.0 inside&lt;BR /&gt;http 172.16.1.0 255.255.255.0 MGMT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5 TRANS_ESP_3DES_SHA&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp nat-traversal 200&lt;BR /&gt;crypto isakmp ipsec-over-tcp port 10000 &lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh XXXX_net 255.255.255.0 inside&lt;BR /&gt;ssh XXXX_other_net 255.255.255.0 inside&lt;BR /&gt;ssh 172.16.1.0 255.255.255.0 MGMT&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; &lt;BR /&gt;[usernames-ommited]&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool RA-IP-Pool&lt;BR /&gt; address-pool NEW-POOL&lt;BR /&gt; address-pool WIN-POOL&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt; no authentication chap&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect pptp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:2a15a897244d95160b7f34f2b8a1c8f6&lt;BR /&gt;: end&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 13:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873179#M154210</guid>
      <dc:creator>ECCsimmons</dc:creator>
      <dc:date>2016-05-05T13:34:59Z</dc:date>
    </item>
    <item>
      <title>if you issue the command show</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873180#M154211</link>
      <description>&lt;P&gt;if you issue the command show nat do you see any hits on your static NAT? &amp;nbsp;Also check your show xlate output to make sure the nat is correct.&lt;/P&gt;
&lt;P&gt;you could also do a packet capture to see if there is traffic in both directions or just one.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;capture capin interface inside match tcp host &amp;lt;server private IP&amp;gt; any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;capture capout interface outside match tcp any host &amp;lt;server public&amp;nbsp;IP&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show cap capin&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show cap capout&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Also, I would suggest removing nat-control. Any reason why you have the following configured?&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;list wan_xmit extended permit ip any any&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;group&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; wan_xmit &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;out&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; outside&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 13:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873180#M154211</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-05-05T13:58:42Z</dc:date>
    </item>
    <item>
      <title>I will look into your</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873181#M154212</link>
      <description>&lt;P&gt;I will look into your suggestions, as for the configuration, this setup was installed and maintained by a prior employee. They had VPN and a couple other wacky things going on at that time, and we've since simplified our network and don't need anything special anymore. I just haven't had a chance to go through and eliminate the unnecessary configuration settings yet.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 14:14:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873181#M154212</guid>
      <dc:creator>ECCsimmons</dc:creator>
      <dc:date>2016-05-05T14:14:00Z</dc:date>
    </item>
    <item>
      <title>It's strange, I'm not seeing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873182#M154213</link>
      <description>&lt;P&gt;It's strange, I'm not seeing anything from the captures. 0 packets on both.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show nat&lt;/P&gt;
&lt;P&gt;- no hits&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show xlate&lt;/P&gt;
&lt;P&gt;- Global 66.152.125.244 Local 10.255.170.4&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you clarify why I would want to disable nat-control? I wouldn't think that this would hurt given we have the static NAT rule for the inside IP?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Some other information:&lt;/P&gt;
&lt;P&gt;We have a dell powerconnect switch between the ASA and the WAN. The powerconnect has two VLANs, one for LAN, and one for WAN. The ASA&amp;nbsp;outside interface is connected to the&amp;nbsp;WAN VLAN, and then the inside interfaces feeds back into LAN VLAN. &amp;nbsp;If I move the server I'm trying to NAT to the dell WAN VLAN, instead of the internal LAN, and assign it the public IP, it works as expected. So I know the traffic is coming in and hitting that WAN VLAN &amp;amp; thus the outside interface of the ASA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 14:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873182#M154213</guid>
      <dc:creator>ECCsimmons</dc:creator>
      <dc:date>2016-05-05T14:40:31Z</dc:date>
    </item>
    <item>
      <title>Are you using the IP or a URL</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873183#M154214</link>
      <description>&lt;P&gt;Are you using the IP or a URL when accessing the server from outside? &amp;nbsp;I think there might be some stale xlate entries that are getting in the way here. &amp;nbsp;Try clearing the xlate table and perhaps even the connections&lt;/P&gt;
&lt;P&gt;clear xlate local 10.255.170.4&lt;/P&gt;
&lt;P&gt;clear xlate global 66.152.125.244&lt;/P&gt;
&lt;P&gt;clear conn&lt;/P&gt;
&lt;P&gt;If this is still not working I suggest doing a reload of the ASA.&lt;/P&gt;
&lt;P&gt;I suggested removing nat-control as it no longer used in newer versions and really doesn't add that much more security.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 15:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873183#M154214</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-05-05T15:02:43Z</dc:date>
    </item>
    <item>
      <title>Had tried both URL and IP.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873184#M154215</link>
      <description>&lt;P&gt;Had tried both URL and IP. Still no traffic. Cleared everything, no luck.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Reloading the ASA is going to be a last ditch effort, I'd prefer to track down what's causing the issue if for nothing other than an educational experience with this device.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 15:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873184#M154215</guid>
      <dc:creator>ECCsimmons</dc:creator>
      <dc:date>2016-05-05T15:25:13Z</dc:date>
    </item>
    <item>
      <title>Have you checked that proxy</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873185#M154216</link>
      <description>&lt;P&gt;Have you checked that proxy arp is enabled on the outside interface?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show run all | in sysopt&lt;/P&gt;
&lt;P&gt;If it is enabled then I again suggest a reload. &amp;nbsp;The problem could be that some sub processes are hanging and causing the issue.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 15:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873185#M154216</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-05-05T15:32:46Z</dc:date>
    </item>
    <item>
      <title>show run all | in sysopt:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873186#M154217</link>
      <description>&lt;P&gt;show run all | in sysopt:&lt;/P&gt;
&lt;P&gt;no sysopt connection timewait&lt;BR /&gt;sysopt connection tcpmss 1380&lt;BR /&gt;sysopt connection tcpmss minimum 0&lt;BR /&gt;sysopt connection permit-vpn&lt;BR /&gt;sysopt connection reclassify-vpn&lt;BR /&gt;no sysopt connection preserve-vpn-flows&lt;BR /&gt;no sysopt nodnsalias inbound&lt;BR /&gt;no sysopt nodnsalias outbound&lt;BR /&gt;no sysopt radius ignore-secret&lt;BR /&gt;no sysopt noproxyarp outside&lt;BR /&gt;no sysopt noproxyarp FLTG&lt;BR /&gt;no sysopt noproxyarp inside&lt;BR /&gt;no sysopt noproxyarp MGMT&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Little confused on the double negative here. "no" sysopt "no"proxyarp outside would logically suggest it is enabled?&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 15:41:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873186#M154217</guid>
      <dc:creator>ECCsimmons</dc:creator>
      <dc:date>2016-05-05T15:41:44Z</dc:date>
    </item>
    <item>
      <title>Yes the no for of that</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873187#M154218</link>
      <description>&lt;P&gt;Yes the no for of that command means it is enabled.&lt;/P&gt;
&lt;P&gt;You could also try to remove the NAT statement, Then clear xlate and then re-add the commands.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 16:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873187#M154218</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-05-05T16:01:09Z</dc:date>
    </item>
    <item>
      <title>So the issue turned out to be</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873188#M154219</link>
      <description>&lt;P&gt;So the issue turned out to be ISP's fault. They made some changes to a piece of hardware and the routing for our static block got screwed up. Now everything is working as it should. Thanks for the assistance, and apologies for any wasted time!&lt;/P&gt;</description>
      <pubDate>Tue, 10 May 2016 16:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-public-server-problem/m-p/2873188#M154219</guid>
      <dc:creator>ECCsimmons</dc:creator>
      <dc:date>2016-05-10T16:15:54Z</dc:date>
    </item>
  </channel>
</rss>

