<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic From the debug outputs, we in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892035#M167686</link>
    <description>&lt;P&gt;From the debug outputs, we can see that ICMP request is going out but we are not getting any ICMP reply.&lt;/P&gt;
&lt;P&gt;ICMP echo request from inside:192.168.13.61 to outside1:100.69.192.179 ID=1 seq=194 len=32&lt;BR /&gt;ICMP echo request from inside:192.168.13.61 to outside1:100.69.192.179 ID=1 seq=195 len=32&lt;BR /&gt;ICMP echo request from inside:192.168.13.61 to outside1:100.69.192.179 ID=1 seq=196 len=32&lt;BR /&gt;ndICMP echo request from inside:192.168.13.61 to outside1:100.69.192.179 ID=1 seq=197 len=32&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This proves that we are sending the packet but we are not getting any reply.&lt;BR /&gt;Does not look like ASA is doing anything fishy here and is working as expected.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
    <pubDate>Tue, 08 Mar 2016 19:19:06 GMT</pubDate>
    <dc:creator>Dinesh Moudgil</dc:creator>
    <dc:date>2016-03-08T19:19:06Z</dc:date>
    <item>
      <title>nat-xlate-failed</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892009#M167660</link>
      <description>&lt;P&gt;Hello Friends,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I change my ASA from 5505 to 5506, and now when I try to access a specific public IP I receive the msg&amp;nbsp;nat-xlate-failed, but this problem occur only with one public IP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Attach is the error from packet trace&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892009#M167660</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2019-03-12T07:27:07Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892010#M167661</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you please share your nat statement &lt;G class="gr_ gr_48 gr-alert gr_gramm undefined Punctuation multiReplace" id="48" data-gr-id="48"&gt;configuration ?&lt;/G&gt;&amp;nbsp;&lt;G class="gr_ gr_100 gr-alert gr_gramm undefined Punctuation multiReplace" id="100" data-gr-id="100"&gt;Also&lt;/G&gt; what is the ASA version you are &lt;G class="gr_ gr_99 gr-alert gr_gramm undefined Punctuation multiReplace" id="99" data-gr-id="99"&gt;running ?&lt;/G&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Please share the output of&amp;nbsp;&lt;BR /&gt;packet-tracer input inside &lt;G class="gr_ gr_235 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="235" data-gr-id="235"&gt;icmp&lt;/G&gt; 192.168.13.3 8 0 100.69.192.179 de&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:15:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892010#M167661</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-08T13:15:14Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892011#M167662</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you share the sh run &lt;G class="gr_ gr_35 gr-alert gr_spell undefined ContextualSpelling" id="35" data-gr-id="35"&gt;nat&lt;/G&gt; &lt;G class="gr_ gr_97 gr-alert gr_gramm undefined Punctuation multiReplace" id="97" data-gr-id="97"&gt;output ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It can be the issue that we are having overlapping NAT statements.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:15:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892011#M167662</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T13:15:55Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892012#M167663</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Follow the command output&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;likasa# sh run nat&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.14.0_25 NETWORK_OBJ_192.168.14.0_25 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside1) source static any any destination static NETWORK_OBJ_192.168.14.0_25 NETWORK_OBJ_192.168.14.0_25 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside1) source static LAN-NAT LAN-NAT destination static NETWORK_OBJ_192.168.14.0_25 NETWORK_OBJ_192.168.14.0_25 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network LAN-NAT&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network LAN-NAT1&lt;BR /&gt; nat (inside,outside1) dynamic interface&lt;BR /&gt;object network WiFi_Guest&lt;BR /&gt; nat (inside,outside1) dynamic interface&lt;BR /&gt;likasa#&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892012#M167663</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T13:30:32Z</dc:date>
    </item>
    <item>
      <title>Hello Dinesh,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892013#M167664</link>
      <description>&lt;P&gt;Hello Dinesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;follow the command output&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;likasa# packet-tracer input inside icmp 192.168.13.3 8 0 100.69.192.179 de&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 189.40.251.175 using egress ifc outside1&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group FW-INSIDE in interface inside&lt;BR /&gt;access-list FW-INSIDE extended permit icmp object-group LAN any&lt;BR /&gt;access-list FW-INSIDE remark BLOQUEIA O RESTO E GERA LOG&lt;BR /&gt;object-group network LAN&lt;BR /&gt; network-object 192.168.13.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddcd2b50, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=1694, user_data=0x7fffe41ae040, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=192.168.13.0, mask=255.255.255.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network LAN-NAT1&lt;BR /&gt; nat (inside,outside1) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.13.3/0 to 186.231.97.189/61796&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffdfad2140, priority=6, domain=nat, deny=false&lt;BR /&gt; hits=4630, user_data=0x7fffdf0965b0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=192.168.13.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=outside1&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffdd400b20, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt; hits=380234, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddbac070, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=196955, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map sfr&lt;BR /&gt; match access-list sfr_redirect&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffde63e350, priority=71, domain=sfr, deny=false&lt;BR /&gt; hits=188943, user_data=0x7fffde63c8f0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffde636ef0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt; hits=1700, user_data=0x7fffde635260, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddbab920, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt; hits=1704, user_data=0x7fffddbaae80, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffdd400b20, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt; hits=380236, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddb3aa00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=152652, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 200874, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;likasa#&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892013#M167664</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T13:32:12Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892014#M167665</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you let us know what traffic are you testing &lt;G class="gr_ gr_83 gr-alert gr_gramm undefined Punctuation multiReplace" id="83" data-gr-id="83"&gt;for ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What &lt;G class="gr_ gr_84 gr-alert gr_gramm undefined Grammar multiReplace" id="84" data-gr-id="84"&gt;is&lt;/G&gt; the source and &lt;G class="gr_ gr_85 gr-alert gr_gramm undefined Punctuation multiReplace" id="85" data-gr-id="85"&gt;destination ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do we have &lt;G class="gr_ gr_128 gr-alert gr_gramm undefined Grammar multiReplace" id="128" data-gr-id="128"&gt;a NAT&lt;/G&gt; statement for the &lt;G class="gr_ gr_131 gr-alert gr_gramm undefined Punctuation multiReplace" id="131" data-gr-id="131"&gt;traffic ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892014#M167665</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T13:33:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892015#M167666</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As per the packet tracer output it is being allowed fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892015#M167666</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T13:34:10Z</dc:date>
    </item>
    <item>
      <title>Can you confirm where is this</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892016#M167667</link>
      <description>&lt;P&gt;Can you confirm where is this IP 192.168.13.1?&lt;BR /&gt;&lt;BR /&gt;Moreover, the above packet tracer does not show any &lt;G class="gr_ gr_61 gr-alert gr_spell undefined ContextualSpelling" id="61" data-gr-id="61"&gt;nat&lt;/G&gt; &lt;G class="gr_ gr_80 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="80" data-gr-id="80"&gt;xlate&lt;/G&gt;&amp;nbsp;failed.&lt;BR /&gt;Can you please share packet tracer output from those IPs where you see this failed message.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892016#M167667</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-08T13:36:47Z</dc:date>
    </item>
    <item>
      <title>Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892017#M167668</link>
      <description>&lt;P&gt;Aditya,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I trying to access SSH, but even ping I can´t.&lt;/P&gt;
&lt;P&gt;There is no special NAT for this traffic.&lt;/P&gt;
&lt;P&gt;This IP is from customer´s router and there is no ACL in this router.&lt;/P&gt;
&lt;P&gt;The origem of the traffic is my inside network (192.168.13.0/24)&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892017#M167668</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T13:41:32Z</dc:date>
    </item>
    <item>
      <title>Dinesh,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892018#M167669</link>
      <description>&lt;P&gt;Dinesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;192.168.13.1 is my router and int this router there is a default router to the ASA 192.168.13.254.&lt;/P&gt;
&lt;P&gt;My machine is 192.168.13.61 and I can´t ping or SSH to this specific IP as you can see below&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;C:\Users\mtormente&amp;gt;tracert 100.69.192.179&lt;/P&gt;
&lt;P&gt;Rastreando a rota para 100.69.192.179 com no máximo 30 saltos&lt;/P&gt;
&lt;P&gt;1 2 ms 2 ms 3 ms 192.168.13.1&lt;BR /&gt; 2 * * * Esgotado o tempo limite do pedido.&lt;BR /&gt; 3 * ^C&lt;BR /&gt;C:\Users\mtormente&amp;gt;tracert 100.69.192.179&lt;/P&gt;
&lt;P&gt;Rastreando a rota para 100.69.192.179 com no máximo 30 saltos&lt;/P&gt;
&lt;P&gt;1 2 ms 2 ms 4 ms 192.168.13.1&lt;BR /&gt; 2 * ^C&lt;BR /&gt;C:\Users\mtormente&amp;gt;ping 100.69.192.179&lt;/P&gt;
&lt;P&gt;Disparando 100.69.192.179 com 32 bytes de dados:&lt;BR /&gt;Esgotado o tempo limite do pedido.&lt;BR /&gt;Esgotado o tempo limite do pedido.&lt;BR /&gt;Esgotado o tempo limite do pedido.&lt;BR /&gt;Esgotado o tempo limite do pedido.&lt;/P&gt;
&lt;P&gt;Estatísticas do Ping para 100.69.192.179:&lt;BR /&gt; Pacotes: Enviados = 4, Recebidos = 0, Perdidos = 4 (100% de&lt;BR /&gt; perda),&lt;/P&gt;
&lt;P&gt;C:\Users\mtormente&amp;gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892018#M167669</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T13:45:37Z</dc:date>
    </item>
    <item>
      <title>marcio.,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892019#M167670</link>
      <description>&lt;P&gt;&lt;A href="https://supportforums.cisco.com/users/marciotormente" title="View user profile." class="username" lang="" about="/users/marciotormente" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;marcio.&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Please run these captures:&lt;BR /&gt;capture &lt;G class="gr_ gr_54 gr-alert gr_spell undefined ContextualSpelling" id="54" data-gr-id="54"&gt;asp&lt;/G&gt; type asp-drop all&lt;/P&gt;
&lt;P&gt;capture &lt;G class="gr_ gr_93 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="93" data-gr-id="93"&gt;capi&lt;/G&gt; interface inside match &lt;G class="gr_ gr_137 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="137" data-gr-id="137"&gt;ip&lt;/G&gt; host&amp;nbsp;&lt;SPAN&gt;192.168.13.61 host&amp;nbsp;100.69.192.179&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Then start ping from the host machine&amp;nbsp;192.168.13.61 and &lt;G class="gr_ gr_261 gr-alert gr_gramm undefined Punctuation multiReplace" id="261" data-gr-id="261"&gt;run :&lt;/G&gt;&lt;BR /&gt;"show cap asp | in 192.168.13.61&amp;nbsp;" to confirm if any packets are getting dropped on ASA.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Along with this, &amp;nbsp;share the output of:&lt;BR /&gt;packet-tracer input inside &lt;G class="gr_ gr_313 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="313" data-gr-id="313"&gt;icmp&lt;/G&gt; 192.168.13.61 8 0 100.69.192.179 de&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892019#M167670</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-08T13:48:51Z</dc:date>
    </item>
    <item>
      <title>Follow the results.</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892020#M167671</link>
      <description>&lt;P&gt;Follow the results.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;likasa# sh cap asp | in 192.168.13.61&lt;BR /&gt; 1: 13:51:18.906554 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt; 3: 13:51:18.911680 192.168.13.61.58263 &amp;gt; 224.0.0.252.5355: udp 22 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt; 5: 13:51:18.912230 192.168.13.61.51939 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 8: 13:51:19.314269 192.168.13.61.58263 &amp;gt; 224.0.0.252.5355: udp 22 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt; 9: 13:51:19.314650 192.168.13.61.51939 &amp;gt; 224.0.0.252.5355: udp 22 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt; 13: 13:51:19.650204 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt; 14: 13:51:20.400583 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt; 173: 13:51:54.877197 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 175: 13:51:54.880127 192.168.13.61.56297 &amp;gt; 224.0.0.252.5355: udp 24&lt;BR /&gt; 181: 13:51:54.963710 192.168.13.61.50261 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 186: 13:51:55.297347 192.168.13.61.56297 &amp;gt; 224.0.0.252.5355: udp 24&lt;BR /&gt; 188: 13:51:55.376124 192.168.13.61.50261 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 192: 13:51:55.634946 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 196: 13:51:55.783574 192.168.13.61.57128 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 202: 13:51:56.194051 192.168.13.61.57128 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 203: 13:51:56.394434 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 216: 13:52:00.111841 192.168.13.61.53292 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 217: 13:52:00.112008 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 221: 13:52:00.521777 192.168.13.61.53292 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 222: 13:52:00.849534 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 227: 13:52:01.135994 192.168.13.61.52778 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 228: 13:52:01.136284 192.168.13.61.54130 &amp;gt; 224.0.0.252.5355: udp 26&lt;BR /&gt; 229: 13:52:01.137535 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 230: 13:52:01.137810 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 231: 13:52:01.138145 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 233: 13:52:01.426476 192.168.13.61.49534 &amp;gt; 64.233.186.188.5228: S 2462096645:2462096645(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 237: 13:52:01.541872 192.168.13.61.54130 &amp;gt; 224.0.0.252.5355: udp 26&lt;BR /&gt; 238: 13:52:01.542223 192.168.13.61.52778 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 240: 13:52:01.607024 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 243: 13:52:01.639020 192.168.13.61.49535 &amp;gt; 64.233.186.188.5228: S 2764756584:2764756584(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 245: 13:52:01.880157 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 246: 13:52:01.880249 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 247: 13:52:01.880523 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 251: 13:52:01.941479 192.168.13.61.49534 &amp;gt; 64.233.186.188.5228: S 2462096645:2462096645(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 253: 13:52:02.141578 192.168.13.61.49535 &amp;gt; 64.233.186.188.5228: S 2764756584:2764756584(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 255: 13:52:02.459174 192.168.13.61.49534 &amp;gt; 64.233.186.188.5228: S 2462096645:2462096645(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 256: 13:52:02.463293 192.168.13.61.49536 &amp;gt; 64.233.186.188.5228: S 2559980654:2559980654(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 257: 13:52:02.644848 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 258: 13:52:02.644970 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 259: 13:52:02.645184 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 260: 13:52:02.659694 192.168.13.61.49535 &amp;gt; 64.233.186.188.5228: S 2764756584:2764756584(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 262: 13:52:02.968867 192.168.13.61.49536 &amp;gt; 64.233.186.188.5228: S 2559980654:2559980654(0) win 8192 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 264: 13:52:03.402811 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 268: 13:52:03.406030 192.168.13.61.51209 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 269: 13:52:03.406396 192.168.13.61.62544 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 270: 13:52:03.406717 192.168.13.61.59828 &amp;gt; 224.0.0.252.5355: udp 26&lt;BR /&gt; 271: 13:52:03.407495 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 272: 13:52:03.407785 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 273: 13:52:03.487432 192.168.13.61.49536 &amp;gt; 64.233.186.188.5228: S 2559980654:2559980654(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&lt;BR /&gt; 280: 13:52:03.819491 192.168.13.61.62544 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 281: 13:52:03.819781 192.168.13.61.59828 &amp;gt; 224.0.0.252.5355: udp 26&lt;BR /&gt; 282: 13:52:03.820086 192.168.13.61.51209 &amp;gt; 224.0.0.252.5355: udp 30&lt;BR /&gt; 286: 13:52:04.165534 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 287: 13:52:04.165808 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 288: 13:52:04.165900 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 290: 13:52:04.927396 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 291: 13:52:04.930905 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 292: 13:52:04.931119 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 310: 13:52:09.150398 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 312: 13:52:09.152168 192.168.13.61.49521 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 314: 13:52:09.569214 192.168.13.61.49521 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 328: 13:52:09.925336 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 333: 13:52:10.666774 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 417: 13:52:21.185094 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 419: 13:52:21.185979 192.168.13.61.52722 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 421: 13:52:21.187368 192.168.13.61.49212 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 432: 13:52:21.597442 192.168.13.61.52722 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 433: 13:52:21.597899 192.168.13.61.49212 &amp;gt; 224.0.0.252.5355: udp 22&lt;BR /&gt; 440: 13:52:21.927015 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;BR /&gt; 443: 13:52:22.683024 192.168.13.61.137 &amp;gt; 192.168.13.255.137: udp 50&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;likasa# packet-tracer input inside icmp 192.168.13.61 8 0 100.69.192.179 de&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffdf096410, priority=13, domain=capture, deny=false&lt;BR /&gt; hits=9629, user_data=0x7fffdf196db0, cs_id=0x0, l3_type=0x0&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddba4480, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=14106997, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 189.40.251.175 using egress ifc outside1&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group FW-INSIDE in interface inside&lt;BR /&gt;access-list FW-INSIDE extended permit icmp object-group LAN any&lt;BR /&gt;access-list FW-INSIDE remark BLOQUEIA O RESTO E GERA LOG&lt;BR /&gt;object-group network LAN&lt;BR /&gt; network-object 192.168.13.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddcd2b50, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=1728, user_data=0x7fffe41ae040, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=192.168.13.0, mask=255.255.255.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network LAN-NAT1&lt;BR /&gt; nat (inside,outside1) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.13.61/0 to 186.231.97.189/44513&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffdfad2140, priority=6, domain=nat, deny=false&lt;BR /&gt; hits=8941, user_data=0x7fffdf0965b0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=192.168.13.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=outside1&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffdd400b20, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt; hits=383114, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddbac070, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=201267, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map sfr&lt;BR /&gt; match access-list sfr_redirect&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffde63e350, priority=71, domain=sfr, deny=false&lt;BR /&gt; hits=193168, user_data=0x7fffde63c8f0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffde636ef0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt; hits=1734, user_data=0x7fffde635260, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddbab920, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt; hits=1738, user_data=0x7fffddbaae80, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffdd400b20, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt; hits=383116, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffddb3aa00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=156881, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside1, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 205107, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_sfr&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 13:54:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892020#M167671</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T13:54:24Z</dc:date>
    </item>
    <item>
      <title>Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892021#M167672</link>
      <description>&lt;P&gt;Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It is quite weird since ASP captures show no packet drops on the ASA.&lt;BR /&gt;Additionally, ASA shows packet tracer allows everything whereas it was conflicting in the image that you attached initially &lt;G class="gr_ gr_145 gr-alert gr_gramm undefined Grammar multiReplace" id="145" data-gr-id="145"&gt;on&lt;/G&gt; the original post.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;This clearly shows that it is going out towards &lt;G class="gr_ gr_235 gr-alert gr_gramm undefined Grammar only-ins replaceWithoutSep" id="235" data-gr-id="235"&gt;outside1&lt;/G&gt; interface. Is it the expected one?&lt;BR /&gt;&lt;SPAN&gt;Phase: 5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network LAN-NAT1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside1) dynamic interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Dynamic translate 192.168.13.61/0 to 186.231.97.189/44513&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;in id=0x7fffdfad2140, priority=6, domain=nat, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hits=8941, user_data=0x7fffdf0965b0, cs_id=0x0, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;src ip/id=192.168.13.0, mask=255.255.255.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;input_ifc=inside, output_ifc=outside1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you please share output of:&lt;BR /&gt;show cap &lt;G class="gr_ gr_326 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="326" data-gr-id="326"&gt;capi&lt;/G&gt;&lt;BR /&gt;show route&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 14:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892021#M167672</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-08T14:00:00Z</dc:date>
    </item>
    <item>
      <title>I have 02 links, the main</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892022#M167673</link>
      <description>&lt;P&gt;I have 02 links, the main link is out from outside1, I didn´t configure the redundance yet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Follow the commands&lt;/P&gt;
&lt;P&gt;likasa# sh cap capi&lt;/P&gt;
&lt;P&gt;158 packets captured&lt;/P&gt;
&lt;P&gt;1: 13:51:53.027998 192.168.13.61 &amp;gt; 100.69.192.179: icmp: echo request&lt;BR /&gt; 2: 13:51:57.606947 192.168.13.61 &amp;gt; 100.69.192.179: icmp: echo request&lt;BR /&gt; 3: 13:52:02.613005 192.168.13.61 &amp;gt; 100.69.192.179: icmp: echo request&lt;BR /&gt; 4: 13:52:07.593246 192.168.13.61 &amp;gt; 100.69.192.179: icmp: echo request&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;likasa# sh route&lt;/P&gt;
&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt; E1 - OSPF external type 1, E2 - OSPF external type 2&lt;BR /&gt; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt; o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;Gateway of last resort is 189.40.251.175 to network 0.0.0.0&lt;/P&gt;
&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 189.40.251.175, outside1&lt;BR /&gt;S 10.0.55.0 255.255.255.0 [1/0] via 189.40.251.175, outside1&lt;BR /&gt;C 177.140.0.0 255.255.252.0 is directly connected, outside&lt;BR /&gt;L 177.140.2.240 255.255.255.255 is directly connected, outside&lt;BR /&gt;S 189.40.226.80 255.255.255.255 [1/0] via 189.40.251.175, outside1&lt;BR /&gt;C 192.168.13.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;L 192.168.13.254 255.255.255.255 is directly connected, inside&lt;BR /&gt;S 192.168.15.0 255.255.255.0 [1/0] via 192.168.13.1, inside&lt;BR /&gt;C 192.168.16.0 255.255.255.0 is directly connected, inside1&lt;BR /&gt;L 192.168.16.1 255.255.255.255 is directly connected, inside1&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 14:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892022#M167673</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T14:07:36Z</dc:date>
    </item>
    <item>
      <title>C 192.168.13.0 255.255.255.0</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892023#M167674</link>
      <description>&lt;P&gt;&lt;SPAN&gt;C 192.168.13.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This confirms that we are learning this subnet from inside interface.&lt;BR /&gt;&lt;BR /&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 189.40.251.175, outside1&lt;BR /&gt;&lt;BR /&gt;This shows default route is via outside1 interface&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Captures show packets are coming in on inside interface and ASP captures confirm no packets are getting dropped.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Couple of things to confirm:&lt;BR /&gt;&lt;BR /&gt;1. Can you check if you have ICMP inspection enabled or &lt;G class="gr_ gr_291 gr-alert gr_gramm undefined Punctuation multiReplace" id="291" data-gr-id="291"&gt;not ?&lt;/G&gt; &lt;BR /&gt;via "show run policy-map"&lt;/SPAN&gt;&lt;BR /&gt;2. Is this the only source or destination you are having &lt;G class="gr_ gr_252 gr-alert gr_gramm gr_disable_anim_appear undefined Grammar only-ins doubleReplace replaceWithoutSep" id="252" data-gr-id="252"&gt;issue&lt;/G&gt; &lt;G class="gr_ gr_253 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="253" data-gr-id="253"&gt;with ?&lt;/G&gt;&lt;BR /&gt;3. Does the ping to this destination work from a different source IP?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 14:11:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892023#M167674</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-08T14:11:38Z</dc:date>
    </item>
    <item>
      <title>yes, I have ICMP inspection,</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892024#M167675</link>
      <description>&lt;P&gt;yes, I have ICMP inspection, follow the command result:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;likasa# sh run policy-map&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect pptp&lt;BR /&gt; class sfr&lt;BR /&gt; sfr fail-open&lt;BR /&gt;policy-map outside-policy&lt;BR /&gt; class outside-class&lt;BR /&gt; priority&lt;BR /&gt;!&lt;BR /&gt;likasa#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have only one network inside (192.168.13.0/24), I made a test from differents host and the result is the same.&lt;/P&gt;
&lt;P&gt;This problem happen only with this specific IP and the must interresting is, if I change the link for my redundancy, works fine.&lt;/P&gt;
&lt;P&gt;All the rule are the same to both links.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 14:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892024#M167675</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T14:17:53Z</dc:date>
    </item>
    <item>
      <title>So the inspection part is</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892025#M167676</link>
      <description>&lt;P&gt;So the inspection part is good.&lt;/P&gt;
&lt;P&gt;Let us check if you can &amp;nbsp;ping this IP from ASA while using outside1 interface.&lt;BR /&gt;&lt;BR /&gt;Do you mean if you transition the internet connection over to&amp;nbsp;&lt;G class="gr_ gr_86 gr-alert gr_gramm gr_disable_anim_appear undefined Grammar multiReplace" id="86" data-gr-id="86"&gt;other interface&lt;/G&gt; other then &lt;G class="gr_ gr_87 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="87" data-gr-id="87"&gt;outside1 ,&lt;/G&gt; it starts working &lt;G class="gr_ gr_88 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="88" data-gr-id="88"&gt;fine ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 14:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892025#M167676</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-08T14:28:34Z</dc:date>
    </item>
    <item>
      <title>No, I can´t ping from the ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892026#M167677</link>
      <description>&lt;P&gt;No, I can´t ping from the ASA to this IP.&lt;/P&gt;
&lt;P&gt;Yes, if I change the link to outside, I can comunicate.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 14:46:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892026#M167677</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T14:46:10Z</dc:date>
    </item>
    <item>
      <title>Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892027#M167678</link>
      <description>&lt;P&gt;Thank you for the confirmation, Marcio&lt;/P&gt;
&lt;P&gt;This indeed proves that ASA configuration is correct for nat and routing of &lt;G class="gr_ gr_159 gr-alert gr_gramm undefined Grammar only-ins doubleReplace replaceWithoutSep" id="159" data-gr-id="159"&gt;internal&lt;/G&gt; network.&lt;BR /&gt;&lt;BR /&gt;Can you confirm what exactly is this IP &lt;G class="gr_ gr_244 gr-alert gr_gramm undefined Punctuation multiReplace" id="244" data-gr-id="244"&gt;for ?&lt;/G&gt;&lt;BR /&gt;&lt;BR /&gt;Note: I tried pinging from my system but ping fails for&amp;nbsp;&lt;SPAN&gt;100.69.192.179.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It might be the fact that they may have restricted ICMP packets for certain IPs.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The best thing that we can do is run "&lt;EM&gt;debug &lt;G class="gr_ gr_404 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="404" data-gr-id="404"&gt;icmp&lt;/G&gt; trace&lt;/EM&gt;" while pinging from ASA and this will show if the echo request is going out and coming in.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Along with &lt;G class="gr_ gr_688 gr-alert gr_gramm undefined Punctuation multiReplace" id="688" data-gr-id="688"&gt;this ,&lt;/G&gt; we could use the same capture (capture &lt;G class="gr_ gr_560 gr-alert gr_spell undefined ContextualSpelling" id="560" data-gr-id="560"&gt;asp&lt;/G&gt; type asp-drop all)&lt;BR /&gt;to check if our ICMP request was dropped or not.&lt;BR /&gt;&lt;BR /&gt;Do not forget to clear captures using "clear cap &lt;G class="gr_ gr_732 gr-alert gr_spell undefined ContextualSpelling" id="732" data-gr-id="732"&gt;asp&lt;/G&gt;" before testing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 14:53:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892027#M167678</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-08T14:53:21Z</dc:date>
    </item>
    <item>
      <title>The ping that your are</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892028#M167679</link>
      <description>&lt;P&gt;The ping that your are testing is correct.&lt;/P&gt;
&lt;P&gt;Attach is the router configuration (destination), only to see that there is no special configuration there.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 15:03:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed/m-p/2892028#M167679</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-03-08T15:03:19Z</dc:date>
    </item>
  </channel>
</rss>

