<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Randy, there is an ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845854#M160126</link>
    <description>&lt;P&gt;Randy, there is an ACL applied to that interface "dmz_access_in" and I have the following line inserted at the top:&lt;/P&gt;
&lt;P&gt;access-list dmz_access_in extended permit tcp object&amp;nbsp;&lt;EM&gt;(location B)-remote_network&lt;/EM&gt; object-group &lt;EM&gt;DMZ_Servers&lt;/EM&gt; eq https&lt;/P&gt;
&lt;P&gt;But this didn't solve the issue or even change the results of my packet trace.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Feb 2016 13:59:56 GMT</pubDate>
    <dc:creator>Adam Hudson</dc:creator>
    <dc:date>2016-02-02T13:59:56Z</dc:date>
    <item>
      <title>Cisco ASA 5520 NAT ACL issues across a EZVPN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845852#M160103</link>
      <description>&lt;P&gt;I have an EZVPN running between two locations, Location A has a 5520 and is the EZVPN server, Location B has a 5506 and is a EZVPN client. Currently I'm trying to set NAT and ACL(s) so that hosts on the Location B inside network can access a few servers in Location A's DMZ. Below are my packet traces from both locations. Attached are sanitized configs from both locations.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;LocationA-Firewall# packet-tracer input dmz tcp &amp;lt;DMZ servers IP&amp;gt; 443 &amp;lt;Location B inside ip&amp;gt; 443&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ROUTE-LOOKUP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: input&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;in&amp;nbsp;&amp;nbsp; &amp;lt;Location B inside ip&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: UN-NAT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: static&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (dmz,outside) source static DMZ_Servers DMZ_Servers destination static (location B)-remote_network (location B)-remote_network no-proxy-arp route-lookup&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;NAT divert to egress interface outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Untranslate &amp;lt;Location B inside ip&amp;gt;/443 to &amp;lt;Location B inside ip&amp;gt;/443&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: DROP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Implicit Rule&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Result:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-interface: dmz&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-interface: outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Action: drop&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;==========================================================&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;LocationB-Firewall# packet-tracer input inside tcp &amp;lt;Location B inside ip&amp;gt; 443 &amp;lt;Location A DMZ server ip&amp;gt; 443&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Implicit Rule&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;MAC Access list&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ROUTE-LOOKUP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: Resolve Egress Interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;found next-hop &amp;lt;internet next hop&amp;gt; using egress ifc&amp;nbsp; outside&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: UN-NAT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: static&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) source static Location_B_Networks Location_B_Networks destination static Remote_DMZ Remote_DMZ no-proxy-arp route-lookup&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;NAT divert to egress interface outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Untranslate &amp;lt;Location A DMZ server ip&amp;gt;/443 to &amp;lt;Location A DMZ server ip&amp;gt;/443&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: log&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group OWL_inside in interface inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list OWL_inside extended permit ip any4 any4 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: NAT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) source static Location_B_Networks Location_B_Networks destination static Remote_DMZ Remote_DMZ no-proxy-arp route-lookup&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Static translate &amp;lt;Location B inside ip&amp;gt;/443 to &amp;lt;Location B inside ip&amp;gt;/443&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: NAT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: per-session&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 7&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: IP-OPTIONS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 8&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: aaa-user&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 9&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: NAT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: rpf-check&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) source static Location_B_Networks Location_B_Networks destination static Remote_DMZ Remote_DMZ no-proxy-arp route-lookup&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 10&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: NAT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: per-session&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 11&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: IP-OPTIONS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 12&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: FLOW-CREATION&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;New flow created with id 568767, packet dispatched to next module&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Result:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-interface: inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-interface: outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Action: allow&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Any help is appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845852#M160103</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2019-03-12T07:13:30Z</dc:date>
    </item>
    <item>
      <title>Hi Adam, </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845853#M160117</link>
      <description>&lt;P&gt;Hi Adam,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there any ACL applied on the DMZ? &amp;nbsp;You should allow&amp;nbsp;the source and destination traffic on it. Also if the DMZ and Outside interface have the same security level, you should add the command "same-security-traffic permit inter-interface"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;An ASP capture might provide more information about this drop as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 01:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845853#M160117</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2016-02-02T01:35:07Z</dc:date>
    </item>
    <item>
      <title>Randy, there is an ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845854#M160126</link>
      <description>&lt;P&gt;Randy, there is an ACL applied to that interface "dmz_access_in" and I have the following line inserted at the top:&lt;/P&gt;
&lt;P&gt;access-list dmz_access_in extended permit tcp object&amp;nbsp;&lt;EM&gt;(location B)-remote_network&lt;/EM&gt; object-group &lt;EM&gt;DMZ_Servers&lt;/EM&gt; eq https&lt;/P&gt;
&lt;P&gt;But this didn't solve the issue or even change the results of my packet trace.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 13:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845854#M160126</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-02T13:59:56Z</dc:date>
    </item>
    <item>
      <title>Randy, after setting up an</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845855#M160139</link>
      <description>&lt;P&gt;Randy, after setting up an ASP capture and running packet traces and pings across the two locations. Combing through the capture results I didn't see anything related to my two endpoints pop up. Also, the DMZ and Outside do not have the same security levels.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 15:15:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845855#M160139</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-02T15:15:24Z</dc:date>
    </item>
    <item>
      <title>Adding: nat (dmz,outside)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845856#M160144</link>
      <description>&lt;P&gt;Adding: &lt;EM&gt;nat (dmz,outside) source static DMZ_Servers DMZ_Servers destination static (location B)-remote_network (location B)-remote_network no-proxy-arp route-lookup &lt;/EM&gt;didn't help either.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 15:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845856#M160144</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-02T15:46:31Z</dc:date>
    </item>
    <item>
      <title>Adding: access-list outside</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845857#M160148</link>
      <description>&lt;P&gt;Adding: &lt;EM&gt;access-list outside_access_in extended permit tcp object (location B)-remote_network object-group DMZ_Servers eq https&lt;/EM&gt; didn't work either.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 16:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845857#M160148</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-02T16:09:58Z</dc:date>
    </item>
    <item>
      <title>Hi Adam, </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845858#M160152</link>
      <description>&lt;P&gt;Hi Adam,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please run a packet-tracer detailed , example:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;packet-tracer input dmz tcp &amp;lt;DMZ servers IP&amp;gt; 443 &amp;lt;Location B inside ip&amp;gt; 443 detailed&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also can you please attach sanitized configuration with the ACLs configs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 18:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845858#M160152</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2016-02-02T18:36:36Z</dc:date>
    </item>
    <item>
      <title>Here's the packet-tracer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845859#M160159</link>
      <description>&lt;P&gt;Here's the packet-tracer results:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ROUTE-LOOKUP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: input&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;in&amp;nbsp;&amp;nbsp; &amp;lt;Location B inside ip&amp;gt;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: UN-NAT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: static&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (dmz,outside) source static DMZ_Servers DMZ_Servers destination static (location B)-remote_network (location B)-remote_network no-proxy-arp route-lookup&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;NAT divert to egress interface outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Untranslate &amp;lt;Location B inside ip&amp;gt;/443 to &amp;lt;Location B inside ip&amp;gt;/443&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Phase: 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: DROP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Implicit Rule&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;in&amp;nbsp; id=0x73cb5f60, priority=11, domain=permit, deny=true&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=343658, user_data=0x5, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=dmz, output_ifc=any&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Result:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-interface: dmz&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;input-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-interface: outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Action: drop&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 18:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845859#M160159</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-02T18:58:23Z</dc:date>
    </item>
    <item>
      <title>I tried adding the DMZ to my</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845860#M160163</link>
      <description>&lt;P&gt;I tried adding the DMZ to my split tunnel list for the EZVPN thinking that might work with this command:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-list ezvpn_split extended permit tcp object-group DMZ_Servers object (location B)-remote_network&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;It didn't help.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 20:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845860#M160163</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-02T20:54:52Z</dc:date>
    </item>
    <item>
      <title>Randy, is there something</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845861#M160167</link>
      <description>&lt;P&gt;Randy, is there something specifically you're looking for in the ACLs? Besides the lines I've included on my posts there's nothing in the ACLs pertaining to the ezvpn network.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2016 15:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845861#M160167</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-03T15:12:34Z</dc:date>
    </item>
    <item>
      <title>Here's what I see in my</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845862#M160170</link>
      <description>&lt;P&gt;Here's what I see in my logging after running packet traces in both directions:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Location A&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 10:05:08 10.255.1.1 %ASA-5-111008: User 'enable_15' executed the 'packet-tracer input dmz tcp &amp;lt;DMZ Server IP&amp;gt; 443 &amp;lt;Location B Inside IP&amp;gt; 443' command.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 10:05:08 10.255.1.1 %ASA-5-111010: User 'enable_15', running 'CLI' from IP x.x.x.x, executed 'packet-tracer input dmz tcp &amp;lt;DMZ Server IP&amp;gt; 443 &amp;lt;Location B Inside IP&amp;gt; 443'&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Location B&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 08:50:30 &amp;lt;Location B Inside IP&amp;gt; %ASA-5-111008: User 'enable_15' executed the 'packet-tracer input inside tcp &amp;lt;Location B Inside IP&amp;gt; 443 &amp;lt;DMZ Server IP&amp;gt; 443' command.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 08:50:30 &amp;lt;Location B Inside IP&amp;gt; %ASA-5-111010: User 'enable_15', running 'CLI' from IP x.x.x.x, executed 'packet-tracer input inside tcp &amp;lt;Location B Inside IP&amp;gt; 443 &amp;lt;DMZ Server IP&amp;gt; 443'&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 08:51:15 &amp;lt;Location B Inside IP&amp;gt; %ASA-7-609001: Built local-host outside:&amp;lt;DMZ Server IP&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 08:51:15 &amp;lt;Location B Inside IP&amp;gt; %ASA-6-302013: Built outbound TCP connection 936480 for outside:&amp;lt;DMZ Server IP&amp;gt;/443 (&amp;lt;DMZ Server IP&amp;gt;/443) to inside:&amp;lt;Location B Inside IP&amp;gt;45/50378 (&amp;lt;Location B Inside IP&amp;gt;45/50378)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 08:51:45 &amp;lt;Location B Inside IP&amp;gt; %ASA-6-302014: Teardown TCP connection 936480 for outside:&amp;lt;DMZ Server IP&amp;gt;/443 to inside:&amp;lt;Location B Inside IP&amp;gt;45/50378 duration 0:00:30 bytes 0 SYN Timeout&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Feb&amp;nbsp; 4 08:51:45 &amp;lt;Location B Inside IP&amp;gt; %ASA-7-609002: Teardown local-host outside:&amp;lt;DMZ Server IP&amp;gt; duration 0:00:30&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Both locations have the following logging options turned on:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;logging enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging timestamp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging standby&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging buffer-size 1048576&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging console emergencies&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging monitor debugging&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging buffered debugging&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging trap debugging&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging asdm notifications&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging facility 23&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging host inside &amp;lt;syslog server IP&amp;gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2016 16:04:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845862#M160170</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-04T16:04:49Z</dc:date>
    </item>
    <item>
      <title>Attached are updated configs</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845863#M160177</link>
      <description>&lt;P&gt;Attached are updated configs with access groups applied to interfaces and ACL entries.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2016 20:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845863#M160177</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-04T20:05:09Z</dc:date>
    </item>
    <item>
      <title>Here's the solution (why</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845864#M160180</link>
      <description>&lt;P&gt;Here's the solution (why Cisco doesn't let you mark your own answers is beyond me) after a lot of pounding my head against this problem: 1) Take out the nat statements at Location B since they interfere with the VPN tunnel:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) source static Location_B_Networks Location_B_Networks destination static Location_A_Networks Location_A_Networks no-proxy-arp route-lookup&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) source static Location_B_Networks Location_B_Networks destination static Remote_DMZ Remote_DMZ no-proxy-arp route-lookup&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;2) Keep the DMZ statement in the split tunnel ACL:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list ezvpn_split extended permit tcp object-group DMZ_Servers object (location B)-remote_network&lt;/EM&gt; &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;3) I had the access list entry switch around for no good reason. It was this:&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;access-list dmz_access_in extended permit tcp object (location B)-remote_network object-group DMZ_Servers eq https&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;when it should have been this:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list dmz_access_in extended permit tcp object-group DMZ_Servers object (location B)-remote_network eq https&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2016 16:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-nat-acl-issues-across-a-ezvpn/m-p/2845864#M160180</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2016-02-08T16:08:22Z</dc:date>
    </item>
  </channel>
</rss>

