<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Marius, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860333#M177292</link>
    <description>Hi Marius,

Thanks for your response. Yes I have 2 interface facing the internet. Also tried the statement you have give before but still it doesn't work. 

regards,</description>
    <pubDate>Thu, 03 Mar 2016 06:25:26 GMT</pubDate>
    <dc:creator>Lost &amp; Found</dc:creator>
    <dc:date>2016-03-03T06:25:26Z</dc:date>
    <item>
      <title>Static NAT issue on Outside interface 2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860331#M177290</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;When accessing my server outside the translated server address(PUBIP) is not accessible.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network PUB&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 1.1.0.3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network RT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 10.0.0.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;nat (outside2,inside) 1 source static any any destination static PUB RT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;or nat (inside,outside2) source static RT PUB&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list outside2_access_in_1 extended permit tcp any object RT eq ssh\telnet\http\https&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group outside2_access_in_1 in interface outside2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Tried to clear xlate but same result&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Server can ping and access the internet. Also it translated to the static address.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;telnet publicaddressofserver 80 &lt;STRONG&gt;failed&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;packet-tracer input outside2 tcp (my outside address) 12345 (defined add) 80 detailed&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: static&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside2) source static Host-10.0.0.1 PUBIP2-2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;NAT divert to egress interface inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Untranslate 1.1.0.3/80 to 10.0.0.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-group outside2_access_in_1 in interface outside2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list outside2_access_in_1 extended permit object-group DM_INLINE_SERVICE_&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2 any object Host-10.0.0.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list outside2_access_in_1 remark ** **&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object-group service DM_INLINE_SERVICE_2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;service-object icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;service-object tcp destination eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;service-object tcp destination eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;service-object tcp destination eq ssh&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;service-object tcp destination eq telnet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;service-object ip&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffe38975e0, priority=13, domain=permit, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=181, user_data=0x7fffe9830000, cs_id=0x0, use_real_addr, flags=0x0,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;protocol=6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.0.0.1, mask=255.255.255.255, port=80, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside2, output_ifc=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside2) source static Host-10.0.0.1 PUBIP2-2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Static translate X.X.X.1/12345 to X.X.X.1/12345&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffe0449210, priority=6, domain=nat, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=48633, user_data=0x7fffe1c928e0, cs_id=0x0, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=1.1.0.3, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside2, output_ifc=inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: per-session&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffe1384ac0, priority=0, domain=nat-per-session, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=22011898, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;x0, protocol=6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffe1b6c6d0, priority=0, domain=inspect-ip-options, deny=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=9263003, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside2, output_ifc=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: SFR&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class-map SFR&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;match access-list ACL_ANY&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;class SFR&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; sfr fail-close&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffe27d58a0, priority=71, domain=sfr, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=64176, user_data=0x7fffe27d2c30, cs_id=0x0, use_real_addr, flags=0x&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside2, output_ifc=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: rpf-check&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside2) source static Host-10.0.0.1 PUBIP2-2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;out id=0x7fffe37be040, priority=6, domain=nat-reverse, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=47921, user_data=0x7fffe1ce3e70, cs_id=0x0, use_real_addr, flags=0x&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.0.0.1, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside2, output_ifc=inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: per-session&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffe1384ac0, priority=0, domain=nat-per-session, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=22011900, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;x0, protocol=6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 9&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffe1acbbe0, priority=0, domain=inspect-ip-options, deny=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=22249269, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Phase: 10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: FLOW-CREATION&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;New flow created with id 21703951, packet dispatched to next module&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Module information for forward flow ...&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_tracer_drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_inspect_ip_options&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_tcp_normalizer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_sfr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_translate&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_tcp_normalizer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_adjacency&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_fragment&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Module information for reverse flow ...&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_tracer_drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_inspect_ip_options&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_tcp_normalizer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_translate&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_sfr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_tcp_normalizer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_adjacency&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_fp_fragment&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Result:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input-interface: outside2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;output-interface: inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;output-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;output-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Action: allow&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;my packettracer output thanks. inoticed that theres &lt;STRONG&gt;"Untranslate 1.1.0.3/80 to 10.0.0.1"&lt;/STRONG&gt; on phase 1&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;thanks&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860331#M177290</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2019-03-12T07:25:52Z</dc:date>
    </item>
    <item>
      <title>Static NAT is bydirectional</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860332#M177291</link>
      <description>&lt;P&gt;Static NAT is bydirectional so you would only need the statement&amp;nbsp;&lt;SPAN&gt;nat (inside,outside2) source static RT PUB.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But I noticed that you have defined the outside interface as outside2. &amp;nbsp;Does this mean that you have another public / internet facing interface? &amp;nbsp;If so then it is quite possible that you have an Asynchronous routing issue going on here, and that could be the reason the packet is being droped. &amp;nbsp;Because packet-tracer only checks the "security checks" between two interfaces it will show allowed, but in reality, the return traffic could be leaving through another interface and the ASA finds no existing connection for this and then drops the packet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 05:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860332#M177291</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-03-03T05:49:08Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860333#M177292</link>
      <description>Hi Marius,

Thanks for your response. Yes I have 2 interface facing the internet. Also tried the statement you have give before but still it doesn't work. 

regards,</description>
      <pubDate>Thu, 03 Mar 2016 06:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860333#M177292</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2016-03-03T06:25:26Z</dc:date>
    </item>
    <item>
      <title>But where is you default</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860334#M177293</link>
      <description>&lt;P&gt;But where is you default route pointing? &amp;nbsp;Are you able to put a more specific route pointing out the outside2 interface for this traffic? &amp;nbsp;If you are using two public interface, then as I mentioned this is most likely a case of asynchronous routing which is by default dropped by the ASA. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The solution to this is to first upgrade to version 9.3 or higher, if you haven't already done so. &amp;nbsp;then use traffic zones to group the two outside interfaces. &amp;nbsp;The zone allows for traffic to enter and leave interfaces within the same zone freely and still maintain the state-table connection. &amp;nbsp;I am a little uncertain if this will cause a hickup in existing traffic so it would be best to do these changes in a service window.&lt;/P&gt;
&lt;P&gt;zone outside&lt;/P&gt;
&lt;P&gt;interface gig0/0&lt;/P&gt;
&lt;P&gt;&amp;nbsp; description outside1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; zone-member outside&lt;/P&gt;
&lt;P&gt;interface gig0/1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; description outside2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; zone-member outside&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 06:41:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860334#M177293</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-03-03T06:41:34Z</dc:date>
    </item>
    <item>
      <title>theres an Error on int g0/1</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860335#M177294</link>
      <description>theres an Error on int g0/1
# zone-member outside
ERROR: Interface with crypto features enabled can't be part of zone

but on int g0/2 its has no error.

thank you</description>
      <pubDate>Thu, 03 Mar 2016 07:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860335#M177294</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2016-03-03T07:00:59Z</dc:date>
    </item>
    <item>
      <title>Default route is - outside</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860336#M177295</link>
      <description>&lt;P&gt;Default route is - outside interface.&lt;/P&gt;
&lt;P&gt;And using PBR to route to outside2 interface. or do i need to create a static nat w/ route map&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 07:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860336#M177295</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2016-03-03T07:16:14Z</dc:date>
    </item>
    <item>
      <title>I think you would still have</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860337#M177296</link>
      <description>&lt;P&gt;I think you would still have an issue as you are not able to place G0/1 in the zone-pair.&lt;/P&gt;
&lt;P&gt;Depending on if it is specific IPs or all IP that are going to access through outside2, this will determine if you use static routing or PBR.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2016 23:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue-on-outside-interface-2/m-p/2860337#M177296</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-03-04T23:33:11Z</dc:date>
    </item>
  </channel>
</rss>

