<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855566#M167148</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;It would be nice to see the output from this command:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input inside tcp 10.20.1.10 4564 2.2.2.11 443&lt;/PRE&gt;
&lt;P&gt;You will be able to see what NAT statement you are actually hitting.&lt;/P&gt;
&lt;P&gt;If you don't realise what the problem is after you have run the packet-tracer command could you also post the output of "show nat".&lt;/P&gt;
&lt;P&gt;And as an advice, use manual NAT statements when doing static NAT so they dont get tangled up with other dynamic NAT statements that also are using object NAT.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 17 May 2016 20:37:17 GMT</pubDate>
    <dc:creator>Henrik Grankvist</dc:creator>
    <dc:date>2016-05-17T20:37:17Z</dc:date>
    <item>
      <title>ASA NAT weirdness, connection reports wrong interface, return traffic not forwarded.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855564#M167144</link>
      <description>&lt;P&gt;Running 9.2(2)4&lt;/P&gt;
&lt;P&gt;We have some static nats, they're object nats.&lt;/P&gt;
&lt;P&gt;Just static nating ip's from inside to outside, and dmz to outside. It was working fine. Now it's not.&lt;/P&gt;
&lt;P&gt;We have some identity nat's before the static nats and some dynamic nats after.&lt;/P&gt;
&lt;P&gt;Here is a list of the interfaces, the outside is a fake address.&lt;/P&gt;
&lt;P&gt;GigabitEthernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.10 &amp;nbsp; 255.255.255.248 CONFIG&lt;BR /&gt;GigabitEthernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.20.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.240.0&amp;nbsp;&amp;nbsp; manual&lt;BR /&gt;GigabitEthernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dmz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.15.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; manual&lt;BR /&gt;GigabitEthernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Meraki&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.9.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; CONFIG&lt;BR /&gt;GigabitEthernet0/3.8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; WirelessGuest&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.8.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; CONFIG&lt;/P&gt;
&lt;P&gt;Here is an example&lt;/P&gt;
&lt;P&gt;object network MISHQ01CRM001&lt;BR /&gt; nat (inside,Outside) static 2.2.2.11 dns&lt;/P&gt;
&lt;P&gt;object network MISHQ01CRM001&lt;BR /&gt; host 10.20.1.66&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;type telnet 2.2.2.11 443 on a windows machine on the Internet.&lt;/P&gt;
&lt;P&gt;show conn | inc 10.20.1.66&lt;BR /&gt;TCP Meraki&amp;nbsp; 70.27.173.10:52502 inside&amp;nbsp; 10.20.1.66:443, idle 0:00:01, bytes 0, flags aB&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Should say Outside not Meraki&lt;/P&gt;
&lt;P&gt;Packet capture show the traffic and responses from server on inside.&lt;/P&gt;
&lt;P&gt;Packet capture shows nothing on interface Outside&lt;/P&gt;
&lt;P&gt;Packet capture on interface Meraki show the inbound packet from 70.27.173.10&lt;/P&gt;
&lt;P&gt;show capture - the capture filters are picking up the 70.27.173.10 address and denying others.&lt;/P&gt;
&lt;P&gt;The cap4 acl is denying the real networks on interface Meraki and accepting all else, other sources than below for the nat being discussed also show up in cap4.&lt;/P&gt;
&lt;P&gt;ASA5525X(config)# show capture&lt;BR /&gt;capture cap1 type raw-data access-list cap1 interface inside headers-only [Capturing - 5750 bytes]&lt;BR /&gt;capture cap2 type raw-data access-list cap1 interface Meraki [Capturing - 2420 bytes]&lt;BR /&gt;capture cap4 type raw-data access-list cap4 interface Meraki [Capturing - 5940 bytes]&lt;/P&gt;
&lt;P&gt;Sample from cap4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 15:01:53.908430&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70.27.173.10.52011 &amp;gt; 10.20.1.66.443: S 855525282:855525282(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 15:01:56.926679&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70.27.173.10.52011 &amp;gt; 10.20.1.66.443: S 855525282:855525282(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 15:02:02.933606&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70.27.173.10.52011 &amp;gt; 10.20.1.66.443: S 855525282:855525282(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sample from cap1&lt;/P&gt;
&lt;P&gt;60: 15:01:53.908491 70.27.173.10.52011 &amp;gt; 10.20.1.66.443: S 2218087414:2218087414(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 61: 15:01:53.908812 10.20.1.66.443 &amp;gt; 70.27.173.10.52011: S 2734516970:2734516970(0) ack 2218087415 win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 62: 15:01:56.908690 10.20.1.66.443 &amp;gt; 70.27.173.10.52011: S 2734516970:2734516970(0) ack 2218087415 win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 63: 15:01:56.926679 70.27.173.10.52011 &amp;gt; 10.20.1.66.443: S 2218087414:2218087414(0) win 8192 &amp;lt;mss 1380,nop,wscale 2,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 64: 15:02:02.909178 10.20.1.66.443 &amp;gt; 70.27.173.10.52011: S 2734516970:2734516970(0) ack 2218087415 win 65535 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 65: 15:02:02.933621 70.27.173.10.52011 &amp;gt; 10.20.1.66.443: S 2218087414:2218087414(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 66: 15:02:14.909117 10.20.1.66.443 &amp;gt; 70.27.173.10.52011: R 2734516971:2734516971(0) win 0&lt;/P&gt;
&lt;P&gt;There is no chance that Internet traffic is coming into the Meraki interface. &lt;/P&gt;
&lt;P&gt;All other nat's dynamic and identity are working fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855564#M167144</guid>
      <dc:creator>Garry Cross</dc:creator>
      <dc:date>2019-03-12T07:45:24Z</dc:date>
    </item>
    <item>
      <title>That is a very old version of</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855565#M167147</link>
      <description>&lt;P&gt;That is a very old version of code. &amp;nbsp;I would upgrade to a known gold star release like&amp;nbsp;&lt;SPAN&gt;asa942-11-smp-k8.bin fist.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://software.cisco.com/download/release.html?mdfid=284143129&amp;amp;softwareid=280775065&amp;amp;release=9.4.2%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;https://software.cisco.com/download/release.html?mdfid=284143129&amp;amp;softwareid=280775065&amp;amp;release=9.4.2%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2016 20:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855565#M167147</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-05-16T20:02:01Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855566#M167148</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;It would be nice to see the output from this command:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input inside tcp 10.20.1.10 4564 2.2.2.11 443&lt;/PRE&gt;
&lt;P&gt;You will be able to see what NAT statement you are actually hitting.&lt;/P&gt;
&lt;P&gt;If you don't realise what the problem is after you have run the packet-tracer command could you also post the output of "show nat".&lt;/P&gt;
&lt;P&gt;And as an advice, use manual NAT statements when doing static NAT so they dont get tangled up with other dynamic NAT statements that also are using object NAT.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2016 20:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855566#M167148</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-05-17T20:37:17Z</dc:date>
    </item>
    <item>
      <title>That will hit...</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855567#M167149</link>
      <description>&lt;P&gt;That will hit...&lt;/P&gt;
&lt;P&gt;object network MeadowPineLan&lt;BR /&gt; nat (inside,Outside) dynamic interface&lt;/P&gt;
&lt;P&gt;Dynamic translate 10.20.1.10/4564 to 2.2.2.10/4564&lt;/P&gt;
&lt;P&gt;PS The problem has disappeared. Everything is working again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2016 21:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855567#M167149</guid>
      <dc:creator>Garry Cross</dc:creator>
      <dc:date>2016-05-17T21:44:07Z</dc:date>
    </item>
    <item>
      <title>Hello Garry, are you doing</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855568#M167152</link>
      <description>&lt;P&gt;Hello Garry, are you doing the Telnet test from the inside network? I don't think it will give you the output you are expecting...&lt;/P&gt;
&lt;P&gt;Could you bring up the output of '&lt;STRONG&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;show route&lt;/SPAN&gt;&lt;/STRONG&gt;'&amp;nbsp; and run the following:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input &lt;STRONG&gt;outside&lt;/STRONG&gt; tcp 8.8.8.8 1025 2.2.2.11 443 detailed&lt;/PRE&gt;
&lt;P&gt;The packet-tracer above is only if you are allowing traffic from any source. If you are delimiting traffic from specific sources on the outside ACL, please change the source.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2016 19:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855568#M167152</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2016-05-18T19:41:43Z</dc:date>
    </item>
    <item>
      <title>Yes from outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855569#M167155</link>
      <description>&lt;P&gt;Yes from outside.&lt;/P&gt;
&lt;P&gt;When I did the packet-tracer using the port numbers of the telnet I was doing at the same time it said the three-way handshake was incomplete.&lt;/P&gt;
&lt;P&gt;When I did it with random source port numbers dest 443 it allowed it and translated it to 10.20.1.66 which we knew already by the packet capture and show conn. I expect somehow the state table was messed up and the return packet did not have a state on interface Outside and so the packet was dropped, since it was a syn/ack and so there was no established session on Outside but rather on Meraki.&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network MISHQ01CRM001&lt;BR /&gt;&amp;nbsp;nat (inside,Outside) static 2.2.2.11 dns&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 2.2.2.11/443 to 10.20.1.66/443&lt;/P&gt;
&lt;P&gt;Not sure what benefit this is but here you go. Keep in mind the failure is gone but default was correct at the time of the failure.&lt;/P&gt;
&lt;P&gt;S*&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 2.2.2.9, Outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.15.1.0 255.255.255.0 is directly connected, dmz&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.15.1.1 255.255.255.255 is directly connected, dmz&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.20.0.0 255.255.240.0 is directly connected, inside&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.20.1.1 255.255.255.255 is directly connected, inside&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.20.20.0 255.255.252.0 [110/11] via 10.40.9.253, 5d05h, Meraki&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.1.0 255.255.255.0 [1/0] via 10.20.1.1, inside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.1.97 255.255.255.255 [1/0] via 216.183.93.9, Outside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.1.99 255.255.255.255 [1/0] via 216.183.93.9, Outside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.1.100 255.255.255.255 [1/0] via 216.183.93.9, Outside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.1.101 255.255.255.255 [1/0] via 216.183.93.9, Outside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.1.102 255.255.255.255 [1/0] via 216.183.93.9, Outside&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.0.0 255.255.252.0 [110/11] via 10.40.9.254, 5d05h, Meraki&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.4.0 255.255.255.0 [110/11] via 10.40.9.254, 5d05h, Meraki&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.5.0 255.255.255.0 [110/11] via 10.40.9.254, 5d05h, Meraki&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.8.0 255.255.255.0 is directly connected, WirelessGuest&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.8.1 255.255.255.255 is directly connected, WirelessGuest&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.9.0 255.255.255.0 is directly connected, Meraki&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.40.9.1 255.255.255.255 is directly connected, Meraki&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.255.252 255.255.255.252 is directly connected, FO_Link&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.255.253 255.255.255.255 is directly connected, FO_Link&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.8 255.255.255.248 is directly connected, Outside&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.10 255.255.255.255 is directly connected, Outside&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2016 19:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855569#M167155</guid>
      <dc:creator>Garry Cross</dc:creator>
      <dc:date>2016-05-18T19:58:35Z</dc:date>
    </item>
    <item>
      <title>Going back to your initial</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855570#M167158</link>
      <description>&lt;P&gt;Going back to your initial post, what source ports did you use on the packet-tracer? I see that connection table shows port &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;52502&lt;/STRONG&gt; &lt;/SPAN&gt;and the capture is showing port &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;52011&lt;/STRONG&gt;&lt;/SPAN&gt;, meaning they are two different connections.&lt;/P&gt;
&lt;P&gt;Is there any IP SLA configured there?&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2016 20:34:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855570#M167158</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2016-05-18T20:34:07Z</dc:date>
    </item>
    <item>
      <title>No ip SLA configured.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855571#M167161</link>
      <description>&lt;P&gt;No ip SLA configured.&lt;/P&gt;
&lt;P&gt;Port numbers were different from multiple examples of attempts to connect. Copied different outputs to show the results. Always the same except for source port.&lt;/P&gt;
&lt;P&gt;Thanks for your interest.&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2016 15:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-weirdness-connection-reports-wrong-interface-return/m-p/2855571#M167161</guid>
      <dc:creator>Garry Cross</dc:creator>
      <dc:date>2016-05-19T15:00:51Z</dc:date>
    </item>
  </channel>
</rss>

