<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780533#M175326</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In the show xlate output i do not see any xlates for the port 8080.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please check if you have the correct NAT statement,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network SERVER_8080&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 192.168.78.252&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nat (inside,outside) static interface service tcp 8080 8080&lt;/P&gt;
&lt;P&gt;With above mentioned nat rule you should see the xlate as:&lt;/P&gt;
&lt;P&gt;TCP PAT from inside:&lt;SPAN&gt;192.168.78.252&lt;/SPAN&gt; 8080-8080 to outside: &lt;SPAN&gt;25.37.123.16&lt;/SPAN&gt;&amp;nbsp;8080-8080&amp;nbsp;flags sr idle 0:00:04 timeout 0:00:00&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Whereas in the output you have attached i do not see anything for port 8080. Follow the steps mentioned by Marius.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also try packet-tracer and check if corect NAT rule is getting evaluated.:&lt;/P&gt;
&lt;P&gt;packet input outside tcp &amp;lt;sourceip&amp;gt; &amp;lt;src-port&amp;gt;&amp;nbsp;&lt;SPAN&gt;25.37.123.16 8080 det&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Share your findings.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;RS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Nov 2015 05:26:53 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-11-05T05:26:53Z</dc:date>
    <item>
      <title>NAT/PAT configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780525#M175316</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have an ASA running 8.4(3) code with ASDM 6.4, and I'm having a trouble reaching a server in the internal network from outside.&lt;/P&gt;
&lt;P&gt;It's a site with an ASA 5505 and one public IP address.&lt;/P&gt;
&lt;P&gt;Lets say I have 192.168.78.252 on my internal lan and it needs some port access to an external IP at 25.37.123.16&lt;/P&gt;
&lt;P&gt;(for examples 8080, 22 and 5000 TCP ports) Do I need NAT, PAT, dynamic NAT ?&amp;nbsp; Any help is greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:49:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780525#M175316</guid>
      <dc:creator>alertescisco</dc:creator>
      <dc:date>2019-03-12T06:49:36Z</dc:date>
    </item>
    <item>
      <title>You just need NAT with port</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780526#M175318</link>
      <description>&lt;P&gt;You just need NAT with port translation...aka PAT.&lt;/P&gt;
&lt;P&gt;object network SERVER_8080&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 192.168.78.252&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nat (inside,outside) static interface service tcp 8080 8080&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;this will translater the server IP to the outside interface IP for real and mapped port 8080.&lt;/P&gt;
&lt;P&gt;then you will need to create a new object for the server for port 22 and 5000.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 09:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780526#M175318</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-11-03T09:36:33Z</dc:date>
    </item>
    <item>
      <title>1) You need static nat.</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780527#M175320</link>
      <description>&lt;P&gt;1) You need static nat.&lt;/P&gt;
&lt;P&gt;2) Access list on outside interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are doing port translation for the server on firewall you can do that in nat statement.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For more information on natting part refer :&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/nat_rules.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 12:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780527#M175320</guid>
      <dc:creator>Iqbal Shaikh</dc:creator>
      <dc:date>2015-11-03T12:16:31Z</dc:date>
    </item>
    <item>
      <title>isn't that just a repeat of</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780528#M175321</link>
      <description>&lt;P&gt;isn't that just a repeat of what I posted?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 12:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780528#M175321</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-11-03T12:33:33Z</dc:date>
    </item>
    <item>
      <title>Thanks for your response.</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780529#M175322</link>
      <description>&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;ACL and NAT rules have been defined, and packet tracer is working on both sides&lt;/P&gt;
&lt;P&gt;(inside =&amp;gt; outside&amp;nbsp; and&amp;nbsp; outside=&amp;gt;inside)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But the external access is still unavailable (trying telnet 25.37.123.16 on 8080 port)&lt;/P&gt;
&lt;P&gt;And real-time log viewer is not showing error (all ACL have debugging mode logging)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 16:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780529#M175322</guid>
      <dc:creator>alertescisco</dc:creator>
      <dc:date>2015-11-03T16:23:18Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780530#M175323</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;If you have configured what Marius has suggested then your internal server should be accessible on public IP.&lt;/P&gt;
&lt;P&gt;As it is not working then you can check following.:&lt;/P&gt;
&lt;P dir="ltr"&gt;1:ASA is getting the traffic or not. To check try following:&lt;/P&gt;
&lt;P dir="ltr"&gt;Apply capture:&lt;/P&gt;
&lt;P dir="ltr"&gt;Cap capi interface outside match TCP any host &amp;lt;public IP&amp;gt; eq 8080&lt;/P&gt;
&lt;P dir="ltr"&gt;Then initiate test traffic.&lt;/P&gt;
&lt;P dir="ltr"&gt;To view captures:&lt;/P&gt;
&lt;P dir="ltr"&gt;Show cap capi&lt;/P&gt;
&lt;P dir="ltr"&gt;Check if you are getting any traffic for port 8080&lt;/P&gt;
&lt;P dir="ltr"&gt;To remove capture:&lt;/P&gt;
&lt;P dir="ltr"&gt;No cap capi&lt;/P&gt;
&lt;P dir="ltr"&gt;&lt;/P&gt;
&lt;P dir="ltr"&gt;Lets us know your findings&lt;/P&gt;
&lt;P dir="ltr"&gt;thanks,&lt;/P&gt;
&lt;P dir="ltr"&gt;RS&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 18:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780530#M175323</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-03T18:28:31Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780531#M175324</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Here are the results of capture :&lt;/P&gt;
&lt;P&gt;(wan ip on asa : 25.37.123.16, wan ip at home 81.68.89.27)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 21:55:40.583221 802.1Q vlan#2 P0 81.68.89.27.51332 &amp;gt; 25.37.123.16.80: S 1595282403:1595282403(0) win 8192 &amp;lt;mss 1452,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 21:55:40.828036 802.1Q vlan#2 P0 81.68.89.27.51333 &amp;gt; 25.37.123.16.80: S 1350892881:1350892881(0) win 8192 &amp;lt;mss 1452,nop,wscale 8,nop,nop,sackOK&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 21:55:42.669948 802.1Q vlan#2 P0 81.68.89.27.51335 &amp;gt; 25.37.123.16.80: S 1624536922:1624536922(0) win 8192 &amp;lt;mss 1452,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And with netstat -a&amp;nbsp; on home computer :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;h-25-37-123-16-80:http&amp;nbsp;&amp;nbsp; SYN_SENT&lt;BR /&gt;h-25-37-123-16-80:http &amp;nbsp; SYN_SENT&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;MSS is set to 1380 on ASA, I tried&amp;nbsp; 1452 and 1460 values.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Shwo xlate command is showing :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;TCP PAT from outside:0.0.0.0/0 80-80 to inside:192.168.78.254 80-80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags srT idle 2:46:57 timeout 0:00:00&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;TCP PAT from inside:192.168.78.252 80-80 to outside:25.37.123.16 80-80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags srT idle 10:16:24 timeout 0:00:00&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 00:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780531#M175324</guid>
      <dc:creator>alertescisco</dc:creator>
      <dc:date>2015-11-05T00:22:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780532#M175325</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;It looks like there is no SYN/ACK from the server side.&lt;/P&gt;
&lt;P&gt;1. You can confirm whether the ASA is sending the SYN packet out of the firewall and check whether it gets any SYN/ACK back on the inside interface. You can do capture on the inside interface "cap capo int inside match tcp h 81.68.89.27 h &amp;lt;Real IP of the server&amp;gt;"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. You can check on the server whether it is responding back or not. Normally we see issue where the server does not respond back becasue the source IP does not belong to the same subnet as the server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Shivapramod M&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 04:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780532#M175325</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2015-11-05T04:22:10Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780533#M175326</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In the show xlate output i do not see any xlates for the port 8080.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please check if you have the correct NAT statement,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network SERVER_8080&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 192.168.78.252&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nat (inside,outside) static interface service tcp 8080 8080&lt;/P&gt;
&lt;P&gt;With above mentioned nat rule you should see the xlate as:&lt;/P&gt;
&lt;P&gt;TCP PAT from inside:&lt;SPAN&gt;192.168.78.252&lt;/SPAN&gt; 8080-8080 to outside: &lt;SPAN&gt;25.37.123.16&lt;/SPAN&gt;&amp;nbsp;8080-8080&amp;nbsp;flags sr idle 0:00:04 timeout 0:00:00&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Whereas in the output you have attached i do not see anything for port 8080. Follow the steps mentioned by Marius.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also try packet-tracer and check if corect NAT rule is getting evaluated.:&lt;/P&gt;
&lt;P&gt;packet input outside tcp &amp;lt;sourceip&amp;gt; &amp;lt;src-port&amp;gt;&amp;nbsp;&lt;SPAN&gt;25.37.123.16 8080 det&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Share your findings.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;RS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 05:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780533#M175326</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-05T05:26:53Z</dc:date>
    </item>
    <item>
      <title>The capture you posted doesn</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780534#M175327</link>
      <description>&lt;P&gt;The capture you posted doesn't show any return traffic either. &amp;nbsp;we only see traffic coming from&amp;nbsp;&lt;SPAN&gt;81.68.89.27 to&amp;nbsp;25.37.123.16 &amp;nbsp;but nothing from&amp;nbsp;25.37.123.16 back to&amp;nbsp;81.68.89.27.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am assuming this capture is on the ASA outside interface. &amp;nbsp;could you also do a capture on the inside interface to see if traffic is actually going out that interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;follow what Rishabh has suggested but for the inside interface...like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cap capi interface inside&amp;nbsp;match TCP any host &amp;lt;private&amp;nbsp;IP&amp;gt; eq 8080&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do you have any access lists on the inside interface that might be blocking return traffic?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 08:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780534#M175327</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-11-05T08:48:25Z</dc:date>
    </item>
    <item>
      <title>Hi, here are the captures :</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780535#M175328</link>
      <description>&lt;P&gt;Hi, here are the captures :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cap capi interface inside match TCP any host &amp;lt;public IP&amp;gt; eq 80&lt;BR /&gt;&lt;BR /&gt;Result of the command: "Show cap capi"&lt;BR /&gt;&lt;BR /&gt;0 packet captured&lt;BR /&gt;&lt;BR /&gt;0 packet shown&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;cap capo int inside match tcp h 81.68.89.27 h &amp;lt;Real IP of the server&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Result of the command: "Show cap capo"&lt;BR /&gt;&lt;BR /&gt;0 packet captured&lt;BR /&gt;&lt;BR /&gt;0 packet shown&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 17:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780535#M175328</guid>
      <dc:creator>alertescisco</dc:creator>
      <dc:date>2015-11-05T17:09:37Z</dc:date>
    </item>
    <item>
      <title>I think you got ports wrong</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780536#M175329</link>
      <description>&lt;P&gt;I think you got ports wrong in your capture command. You should try port 8080 instead of 80 to capture traffic from Ingress on egress interfaces.&lt;/P&gt;
&lt;P&gt;Follow the capture command suggested by Marius and share your findings.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2015 01:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780536#M175329</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-06T01:42:56Z</dc:date>
    </item>
    <item>
      <title>Can you perhaps post the</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780537#M175330</link>
      <description>&lt;P&gt;Can you perhaps post the output of "show nat"? This is just to verify the order of all your NAT rules and whether you are getting hits on the relevant rules in each of the 3 Sections.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2015 04:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780537#M175330</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-11-06T04:39:12Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780538#M175331</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;
&lt;P&gt;Sorry all, my test concerns http port and not 8080 .&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2015 09:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780538#M175331</guid>
      <dc:creator>alertescisco</dc:creator>
      <dc:date>2015-11-06T09:16:03Z</dc:date>
    </item>
    <item>
      <title>Could you run the following</title>
      <link>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780539#M175332</link>
      <description>&lt;P&gt;Could you run the following capture while testing.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cap capin interface inside&amp;nbsp;match TCP any host &amp;lt;private&amp;nbsp;IP&amp;gt; eq 8080&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cap capout interface outside&amp;nbsp;match TCP any host &amp;lt;public IP&amp;gt; eq 8080&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show cap capout&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show cap capin&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you see no traffic on the inside interface please post your ASA's full sanitised running config.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2015 09:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-pat-configuration/m-p/2780539#M175332</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-11-06T09:24:37Z</dc:date>
    </item>
  </channel>
</rss>

