<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL denying traffic on object NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850923#M171788</link>
    <description>&lt;P&gt;I've followed the below guide for setting up a Static PAT using a spare IP so I can keep the WebVPN on the default outside interface using 80/443.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/0/8/132808-NON%20-%20Static%20PAT%20IP.jpg" alt="NON - Static PAT IP.jpg" /&gt;&lt;BR /&gt;&lt;BR /&gt;Here is what it looks like from my config. The default WAN interface is XXX.XXX.210.131&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network Web-Server&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; host 172.17.1.14&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network Web-Server&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; nat (inside,outside) static XXX.XXX.210.137 service tcp www www&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I've also added the following to the access list:&lt;I&gt;&amp;nbsp;&lt;STRONG&gt;access-list outside_access_in extended permit object http any object Web_Server&lt;/STRONG&gt;&lt;BR /&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;Running "show nat" and "show access-list outside_access_in" gives me the following:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;4 (inside) to (outside) source static Web-Server XXX.XXX.210.137 service tcp www www&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; translate_hits = 0, untranslate_hits = 17&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;EM&gt;&lt;STRONG&gt;access-list outside_access_in line 8 extended permit object http any object Web-Server (hitcnt=0) 0x49a6c1e3&lt;BR /&gt; access-list outside_access_in line 8 extended permit tcp any eq www host 172.17.1.14 eq www (hitcnt=0) 0x49a6c1e3&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I checked the log and I'm seeing this.&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;4&lt;/TD&gt;
&lt;TD&gt;Mar 14 2016&lt;/TD&gt;
&lt;TD&gt;18:30:03&lt;/TD&gt;
&lt;TD&gt;106023&lt;/TD&gt;
&lt;TD&gt;70.210.3.15&lt;/TD&gt;
&lt;TD&gt;5421&lt;/TD&gt;
&lt;TD&gt;172.17.1.14&lt;/TD&gt;
&lt;TD&gt;80&lt;/TD&gt;
&lt;TD&gt;Deny tcp src outside:70.210.3.15/5421 dst inside:172.17.1.14/80 by access-group "outside_access_in" [0x0, 0x0]&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;I&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;I'm sure I'm missing something simple and I've tried several different things but I continue to get the following error in the log regardless of what I try.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;I&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&lt;I&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/I&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:29:11 GMT</pubDate>
    <dc:creator>tim829</dc:creator>
    <dc:date>2019-03-12T07:29:11Z</dc:date>
    <item>
      <title>ACL denying traffic on object NAT</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850923#M171788</link>
      <description>&lt;P&gt;I've followed the below guide for setting up a Static PAT using a spare IP so I can keep the WebVPN on the default outside interface using 80/443.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/0/8/132808-NON%20-%20Static%20PAT%20IP.jpg" alt="NON - Static PAT IP.jpg" /&gt;&lt;BR /&gt;&lt;BR /&gt;Here is what it looks like from my config. The default WAN interface is XXX.XXX.210.131&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network Web-Server&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; host 172.17.1.14&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network Web-Server&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; nat (inside,outside) static XXX.XXX.210.137 service tcp www www&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I've also added the following to the access list:&lt;I&gt;&amp;nbsp;&lt;STRONG&gt;access-list outside_access_in extended permit object http any object Web_Server&lt;/STRONG&gt;&lt;BR /&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;Running "show nat" and "show access-list outside_access_in" gives me the following:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;4 (inside) to (outside) source static Web-Server XXX.XXX.210.137 service tcp www www&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; translate_hits = 0, untranslate_hits = 17&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;EM&gt;&lt;STRONG&gt;access-list outside_access_in line 8 extended permit object http any object Web-Server (hitcnt=0) 0x49a6c1e3&lt;BR /&gt; access-list outside_access_in line 8 extended permit tcp any eq www host 172.17.1.14 eq www (hitcnt=0) 0x49a6c1e3&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I checked the log and I'm seeing this.&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;4&lt;/TD&gt;
&lt;TD&gt;Mar 14 2016&lt;/TD&gt;
&lt;TD&gt;18:30:03&lt;/TD&gt;
&lt;TD&gt;106023&lt;/TD&gt;
&lt;TD&gt;70.210.3.15&lt;/TD&gt;
&lt;TD&gt;5421&lt;/TD&gt;
&lt;TD&gt;172.17.1.14&lt;/TD&gt;
&lt;TD&gt;80&lt;/TD&gt;
&lt;TD&gt;Deny tcp src outside:70.210.3.15/5421 dst inside:172.17.1.14/80 by access-group "outside_access_in" [0x0, 0x0]&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;I&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;I'm sure I'm missing something simple and I've tried several different things but I continue to get the following error in the log regardless of what I try.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;I&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&lt;I&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:29:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850923#M171788</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2019-03-12T07:29:11Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850924#M171790</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;From the log, it looks like that you are trying to access the real (private ip 172.17.1.14 from Outside, not the mapped one &lt;EM&gt;&lt;STRONG&gt;XXX.XXX.210.137&lt;/STRONG&gt;&lt;/EM&gt;). That is the reason you are getting this log.&lt;/P&gt;
&lt;P&gt;- access Public IP(mapped one) from your outside host.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 18:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850924#M171790</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2016-03-14T18:51:21Z</dc:date>
    </item>
    <item>
      <title>Correct, but if you look at</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850925#M171792</link>
      <description>&lt;P&gt;Correct, but if you look at the NAT above it looks right according to the documentation I was following. Are you suggesting I need to change the ACL, not that NAT?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850925#M171792</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2016-03-14T19:03:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850926#M171794</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am not sure&amp;nbsp; what you have specified in that object 'http' however you could create this simple access-list and remove those you have created:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object Web_Server eq http&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Also access '&lt;EM&gt;XXX.XXX.210.137&lt;/EM&gt;' instead of&amp;nbsp; 172.17.1.14 from 70.210.3.15&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hope it helps.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Regards,&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Akshay Rastogi&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Remember to rate helpful posts.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850926#M171794</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2016-03-14T19:09:34Z</dc:date>
    </item>
    <item>
      <title>Ok, so what I did was reverse</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850927#M171796</link>
      <description>&lt;P&gt;Ok, so what I did was reverse the NAT and now I see this in the log.&lt;/P&gt;
&lt;P&gt;I did go in and add the .210.137 IP to the ACL "outside_access_in" as well.&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;4&lt;/TD&gt;
&lt;TD&gt;Mar 14 2016&lt;/TD&gt;
&lt;TD&gt;19:09:24&lt;/TD&gt;
&lt;TD&gt;106023&lt;/TD&gt;
&lt;TD&gt;70.210.3.15&lt;/TD&gt;
&lt;TD&gt;5428&lt;/TD&gt;
&lt;TD&gt;165.166.210.137&lt;/TD&gt;
&lt;TD&gt;80&lt;/TD&gt;
&lt;TD&gt;Deny tcp src outside:70.210.3.15/5428 dst outside:XXX.XXX.210.137/80 by access-group "outside_access_in" [0x0, 0x0]&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850927#M171796</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2016-03-14T19:10:03Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850928#M171797</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Seems an ACL issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You just need the following ACL statement:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;access-list outside_access_in line 8 extended permit &lt;G class="gr_ gr_66 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="66" data-gr-id="66"&gt;tcp&lt;/G&gt; any host 172.17.1.14 eq www&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Seems you may have used ASDM for configuring it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850928#M171797</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-14T19:18:05Z</dc:date>
    </item>
    <item>
      <title>I removed the other ACL and</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850929#M171799</link>
      <description>&lt;P&gt;I removed the other ACL and added the one you advised above.&lt;/P&gt;
&lt;P&gt;Still getting this in the log. I've tried about everything I can think of.&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;4&lt;/TD&gt;
&lt;TD&gt;Mar 14 2016&lt;/TD&gt;
&lt;TD&gt;19:22:01&lt;/TD&gt;
&lt;TD&gt;106023&lt;/TD&gt;
&lt;TD&gt;70.210.3.15&lt;/TD&gt;
&lt;TD&gt;5423&lt;/TD&gt;
&lt;TD&gt;XXX.XXX.210.137&lt;/TD&gt;
&lt;TD&gt;80&lt;/TD&gt;
&lt;TD&gt;Deny tcp src outside:70.210.3.15/5423 dst outside:XXX.XXX.210.137/80 by access-group "outside_access_in" [0x0, 0x0]&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850929#M171799</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2016-03-14T19:22:44Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850930#M171801</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Share the packet tracer result:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside &lt;G class="gr_ gr_76 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="76" data-gr-id="76"&gt;tcp&lt;/G&gt;&amp;nbsp;&lt;SPAN&gt;70.210.3.15 5423&amp;nbsp;XXX.XXX.210.137 80 detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850930#M171801</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-14T19:25:05Z</dc:date>
    </item>
    <item>
      <title>Alright I got it working. I</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850931#M171804</link>
      <description>&lt;P&gt;Alright I got it working. I removed the object based NAT rule and added a static NAT instead. Here is the NAT I added..&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (outside,inside) source static any any destination static XXX.XXX.210.137&amp;nbsp;172.17.1.14&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I left the ACL the way I had it, just allowing port 80 traffic to 172.17.1.14&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any explanation why this worked but the other didn't?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850931#M171804</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2016-03-14T19:30:55Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850932#M171807</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As already suggested a packet-tracer would have answered this query.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And the traffic was denied by access-group and not the NAT statement.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:33:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850932#M171807</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-14T19:33:28Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850933#M171809</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;The other one also should work, i guess there is some overlapping nat statement which might be stopping this. Please share the output of 'show run nat'&lt;/P&gt;
&lt;P&gt;Also the output of packet-tracer as requested by Aditya.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850933#M171809</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2016-03-14T19:34:40Z</dc:date>
    </item>
    <item>
      <title>gwdcity-asa# packet-tracer</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850934#M171811</link>
      <description>&lt;P&gt;gwdcity-asa# packet-tracer input outside tcp 70.210.3.15 5423 XXX.XXX.210.137 $&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad59526c0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=270969751, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source static any any destination static XXX.XXX.210.137 IRSA_Server description IRSA / Web Server NAT / Port 80&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate XXX.XXX.210.137/80 to 172.17.1.14/80&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object IRSA_Server eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad5b37450, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=14, user_data=0x2aaacdbe8480, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.17.1.14, mask=255.255.255.255, port=80, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source static any any destination static XXX.XXX.210.137 IRSA_Server description IRSA / Web Server NAT / Port 80&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 70.210.3.15/5423 to 70.210.3.15/5423&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad61d7f00, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=32, user_data=0x2aaad8d93e90, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=XXX.XXX.210.137, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=inside&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad4f3f910, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=3139292, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad595ab80, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=2630246, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad62363d0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=224422, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside) source static any any destination static XXX.XXX.210.137 IRSA_Server description IRSA / Web Server NAT / Port 80&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x2aaad8d81bb0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=33, user_data=0x2aaad68cc450, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.17.1.14, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=inside&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad4f3f910, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=3139294, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad5aee060, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=2686070, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2636781, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Manual NAT Policies (Section 1)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;1 (inside) to (outside) source static any any destination static NETWORK_OBJ_10.15.65.0_24 NETWORK_OBJ_10.15.65.0_24 no-proxy-arp route-lookup description *DO NOT DELETE* NAT for AnyConnect VPN&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 0, untranslate_hits = 0&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;2 (outside) to (inside) source static any any destination static XXX.XXX.210.137 IRSA_Server description IRSA / Web Server NAT / Port 80&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 23, untranslate_hits = 35&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Auto NAT Policies (Section 2)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;1 (any) to (outside) source static Danny_Mac interface service tcp 8080 8080&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 0, untranslate_hits = 90&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;2 (any) to (outside) source static Camera-Fountain interface service tcp www 9081&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 0, untranslate_hits = 20&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;3 (any) to (outside) source static Camera-Oak-Main interface service tcp www 9082&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 0, untranslate_hits = 21&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;4 (any) to (outside) source static City-ComServer interface service udp 5008 5008&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 25, untranslate_hits = 490&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;5 (any) to (outside) source static County-ComServer interface service udp 5008 5009&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 44, untranslate_hits = 556&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;6 (any) to (outside) source static Piler interface service tcp smtp smtp&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 0, untranslate_hits = 1171&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;7 (any) to (outside) source static HVAC_IP interface service tcp www 88&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 0, untranslate_hits = 22&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;8 (any) to (outside) source dynamic obj_any interface&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; translate_hits = 2403513, untranslate_hits = 49162&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 19:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850934#M171811</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2016-03-14T19:49:55Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850935#M171812</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can you once again try to remove this manual nat and add the below one:&lt;/P&gt;
&lt;P&gt;Object net &lt;STRONG&gt;&lt;EM&gt;IRSA_Server&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;nat (inside,outside) static &amp;lt;mapped-ip&amp;gt; service tcp 80 80&lt;/P&gt;
&lt;P&gt;If this mapped ip is the outside interface ip then use 'interface' keyword instead of the mapped ip.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 20:06:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850935#M171812</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2016-03-14T20:06:16Z</dc:date>
    </item>
    <item>
      <title>I removed the static/manual</title>
      <link>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850936#M171814</link>
      <description>&lt;P&gt;I removed the static/manual NAT and added back in the object NAT provided above and it's working. Not sure what happened because I believe we had already tried&amp;nbsp;that one. However it's working so I'm content, thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 20:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-denying-traffic-on-object-nat/m-p/2850936#M171814</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2016-03-14T20:13:35Z</dc:date>
    </item>
  </channel>
</rss>

