<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Akshay, Thanks for the reply. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764360#M177715</link>
    <description>&lt;P&gt;Akshay,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply. You are right on the inside interface NAT. I am actually having issue with the dmz1 interface. My server is on the dmz1 interface. With that being said, do I need a manual NAT for the server IP 172.28.10.50 ?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Oct 2015 17:00:44 GMT</pubDate>
    <dc:creator>alex.vue</dc:creator>
    <dc:date>2015-10-14T17:00:44Z</dc:date>
    <item>
      <title>Unable to access web server from the outside</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764358#M177713</link>
      <description>&lt;P&gt;All-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am unable to access my web server from the public. I can access locally if I by pass the FW, I can access as well. Nat and ACLs are in placed. Below is my config;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(2)&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.16.1.56 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif dmz1&lt;BR /&gt;&amp;nbsp;security-level 40&lt;BR /&gt;&amp;nbsp;ip address 172.28.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.28.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa832-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;name-server 8.8.4.4&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network INSIDE&lt;BR /&gt;&amp;nbsp;subnet 172.28.1.0 255.255.255.0&lt;BR /&gt;object network OUTSIDE-172.16&lt;BR /&gt;&amp;nbsp;subnet 172.16.1.0 255.255.255.128&lt;BR /&gt;object network obj-172.28.10.50&lt;BR /&gt;&amp;nbsp;host 172.28.10.50&lt;BR /&gt;object network dmz1_network&lt;BR /&gt;&amp;nbsp;subnet 172.28.10.0 255.255.255.0&lt;BR /&gt;object network obj-172.16.1.50&lt;BR /&gt;&amp;nbsp;host 172.16.1.50&lt;BR /&gt;access-list acl_outside_in extended permit tcp host 172.28.10.254 host 172.16.1.56 eq ssh&lt;BR /&gt;access-list acl_outside_in extended permit tcp any host 172.28.10.50 eq https log&lt;BR /&gt;access-list acl_dmz1_in extended permit icmp any host 172.28.10.50&lt;BR /&gt;access-list acl_dmz1_in extended permit udp host 172.28.10.50 any eq domain&lt;BR /&gt;access-list acl_dmz1_in extended permit ip host 172.28.10.50 any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging standby&lt;BR /&gt;logging buffer-size 262144&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging monitor notifications&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging history errors&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging facility 18&lt;BR /&gt;logging queue 8192&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz1 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-743.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;nat (inside,outside) source static INSIDE INSIDE destination static OUTSIDE-172.16 OUTSIDE-172.16&lt;BR /&gt;nat (inside,dmz1) source static INSIDE INSIDE&lt;BR /&gt;!&lt;BR /&gt;object network INSIDE&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network Liebert-AC&lt;BR /&gt;&amp;nbsp;nat (dmz1,outside) static 172.16.1.50 service tcp https https&lt;BR /&gt;object network dmz1_network&lt;BR /&gt;&amp;nbsp;nat (dmz1,outside) dynamic interface&lt;BR /&gt;access-group acl_outside_in in interface outside&lt;BR /&gt;access-group acl_dmz1_in in interface dmz1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.16.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 172.16.1.0 255.255.255.128 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;&lt;BR /&gt;ssh 172.16.1.0 255.255.255.128 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;svc image disk0:/anyconnect-win-3.1.05160-k9.pkg 1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:09bb35574a1eef1b3ddee51778f73480&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PACKET-Tracer:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW01XXXX# packet-tracer input outside tcp 4.2.2.2 5555 172.16.1.50 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-172.28.10.50&lt;BR /&gt;&amp;nbsp;nat (dmz1,outside) static 172.16.1.50 service tcp https https&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface dmz1&lt;BR /&gt;Untranslate 172.16.1.50/443 to 172.28.10.50/443&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_outside_in in interface outside&lt;BR /&gt;access-list acl_outside_in extended permit tcp any host 172.28.10.50 eq https log&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;object network obj-172.28.10.50&lt;BR /&gt;&amp;nbsp;nat (dmz1,outside) static 172.16.1.50 service tcp https https&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 8378, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Log:&lt;/P&gt;&lt;P&gt;Oct 14 2015 08:33:22: %ASA-6-106100: access-list acl_outside_in permitted tcp outside/x.x.x.x(34522) -&amp;gt; dmz1/172.28.10.50(443) hit-cnt 1 first hit [0x92530be, 0x0]&lt;BR /&gt;Oct 14 2015 08:33:22: %ASA-7-609001: Built local-host outside:x.x.x.x&lt;BR /&gt;Oct 14 2015 08:33:22: %ASA-6-302013: Built inbound TCP connection 8382 for outside:x.x.x.x/34522 (x.xx.x.x/34522) to dmz1:172.28.10.50/443 (172.16.1.50/443)&lt;BR /&gt;Oct 14 2015 08:33:22: %ASA-6-106100: access-list acl_outside_in permitted tcp outside/x.x.x.x(34530) -&amp;gt; dmz1/172.28.10.50(443) hit-cnt 1 first hit [0x92530be, 0x0]&lt;BR /&gt;Oct 14 2015 08:33:22: %ASA-6-302013: Built inbound TCP connection 8383 for outside:x.x.x.x/34530 (x.x.x.x/34530) to dmz1:172.28.10.50/443 (172.16.1.50/443)&lt;BR /&gt;Oct 14 2015 08:33:43: %ASA-6-106100: access-list acl_outside_in permitted tcp outside/x.x.x.x(35243) -&amp;gt; dmz1/172.28.10.50(443) hit-cnt 1 first hit [0x92530be, 0x0]&lt;BR /&gt;Oct 14 2015 08:33:43: %ASA-6-302013: Built inbound TCP connection 8384 for outside:x.x.x.x/35243 (x.x.x.x/35243) to dmz1:172.28.10.50/443 (172.16.1.50/443)&lt;BR /&gt;Oct 14 2015 08:33:52: %ASA-6-302014: Teardown TCP connection 8382 for outside:x.x.x.x/34522 to dmz1:172.28.10.50/443 dura&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My page never got loaded. What am I missing here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764358#M177713</guid>
      <dc:creator>alex.vue</dc:creator>
      <dc:date>2019-03-12T06:45:02Z</dc:date>
    </item>
    <item>
      <title>Hi Alex,Packet-tracer shows</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764359#M177714</link>
      <description>&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;Packet-tracer shows it is allowed but it could be Manual NAT statement ordering as well.&lt;/P&gt;&lt;P&gt;From the nat statement i could see the you already have object nat for all the inside traffic for internet access therefore you could remove the first manual dynamic nat :&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;nat (inside,outside) source dynamic any interface"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Check if this works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Also have you tried taking captures on ASA interfaces for the traffic?&amp;nbsp;Take the below captures and see if all the traffic works fine you you see the complete 3-way handshake :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;capture capi interface inside match tcp host&amp;nbsp;172.28.10.50 host &amp;lt;your pc public ip&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;capture capo interface outside match tcp host&amp;nbsp;172.16.1.50 host&amp;nbsp;&amp;lt;your pc public ip&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;capture drop type asp-drop all (to see if there is any drop for the traffic)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Akshay Rastogi&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 16:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764359#M177714</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-14T16:54:14Z</dc:date>
    </item>
    <item>
      <title>Akshay, Thanks for the reply.</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764360#M177715</link>
      <description>&lt;P&gt;Akshay,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply. You are right on the inside interface NAT. I am actually having issue with the dmz1 interface. My server is on the dmz1 interface. With that being said, do I need a manual NAT for the server IP 172.28.10.50 ?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 17:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764360#M177715</guid>
      <dc:creator>alex.vue</dc:creator>
      <dc:date>2015-10-14T17:00:44Z</dc:date>
    </item>
    <item>
      <title>Akshay,Below are the captures</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764361#M177716</link>
      <description>&lt;P&gt;Akshay,&lt;/P&gt;&lt;P&gt;Below are the captures;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;XXXFW01# sh capture capi&lt;/P&gt;&lt;P&gt;21 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 10:12:21.229175 x.x.x.x.10132 &amp;gt; 172.28.10.50.443: S 2141124451:2141124451(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 10:12:24.229327 x.x.x.x.10132 &amp;gt; 172.28.10.50.443: S 2141124451:2141124451(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 10:12:30.229709 x.x.x.x.10132 &amp;gt; 172.28.10.50.443: S 2141124451:2141124451(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 10:12:42.221897 x.x.x.x.10780 &amp;gt; 172.28.10.50.443: S 4072524934:4072524934(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 10:12:42.472677 x.x.x.x.10790 &amp;gt; 172.28.10.50.443: S 97694985:97694985(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 10:12:45.221866 x.x.x.x.10780 &amp;gt; 172.28.10.50.443: S 4072524934:4072524934(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 10:12:45.471899 x.x.x.x.10790 &amp;gt; 172.28.10.50.443: S 97694985:97694985(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 10:12:51.223895 x.x.x.x.10780 &amp;gt; 172.28.10.50.443: S 4072524934:4072524934(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 10:12:51.474355 x.x.x.x.10790 &amp;gt; 172.28.10.50.443: S 97694985:97694985(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 10: 10:13:03.477773 x.x.x.x.11568 &amp;gt; 172.28.10.50.443: S 886242131:886242131(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 11: 10:13:06.475897 x.x.x.x.11568 &amp;gt; 172.28.10.50.443: S 886242131:886242131(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 12: 10:13:12.474035 x.x.x.x.11568 &amp;gt; 172.28.10.50.443: S 886242131:886242131(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 13: 10:13:24.476400 x.x.x.x.12480 &amp;gt; 172.28.10.50.443: S 1764168049:1764168049(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 14: 10:13:24.726662 x.x.x.x.12484 &amp;gt; 172.28.10.50.443: S 1328452944:1328452944(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 15: 10:13:27.476476 x.x.x.x.12480 &amp;gt; 172.28.10.50.443: S 1764168049:1764168049(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 16: 10:13:27.727058 x.x.x.x.12484 &amp;gt; 172.28.10.50.443: S 1328452944:1328452944(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 17: 10:13:33.471182 x.x.x.x.12480 &amp;gt; 172.28.10.50.443: S 1764168049:1764168049(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 18: 10:13:33.721962 x.x.x.x.12484 &amp;gt; 172.28.10.50.443: S 1328452944:1328452944(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 19: 10:13:45.730247 x.x.x.x.13012 &amp;gt; 172.28.10.50.443: S 3230414906:3230414906(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 20: 10:13:48.722466 x.x.x.x.13012 &amp;gt; 172.28.10.50.443: S 3230414906:3230414906(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 21: 10:13:54.723992 x.x.x.x.13012 &amp;gt; 172.28.10.50.443: S 3230414906:3230414906(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;21 packets shown&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;XXXFW01#&amp;nbsp; sh capture capo&lt;/P&gt;&lt;P&gt;18 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 10:12:42.221698 x.x.x.x.10780 &amp;gt; 172.16.1.50.443: S 3825201827:3825201827(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 10:12:42.472479 x.x.x.x.10790 &amp;gt; 172.16.1.50.443: S 2730085291:2730085291(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 10:12:45.221836 x.x.x.x.10780 &amp;gt; 172.16.1.50.443: S 3825201827:3825201827(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 10:12:45.471868 x.x.x.x.10790 &amp;gt; 172.16.1.50.443: S 2730085291:2730085291(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 10:12:51.223865 x.x.x.x.10780 &amp;gt; 172.16.1.50.443: S 3825201827:3825201827(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 10:12:51.474325 x.x.x.x.10790 &amp;gt; 172.16.1.50.443: S 2730085291:2730085291(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 10:13:03.477575 x.x.x.x.11568 &amp;gt; 172.16.1.50.443: S 304360431:304360431(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 10:13:06.475851 x.x.x.x.11568 &amp;gt; 172.16.1.50.443: S 304360431:304360431(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 10:13:12.474005 x.x.x.x.11568 &amp;gt; 172.16.1.50.443: S 304360431:304360431(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 10: 10:13:24.476186 x.x.x.x.12480 &amp;gt; 172.16.1.50.443: S 1626187008:1626187008(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 11: 10:13:24.726479 x.x.x.x.12484 &amp;gt; 172.16.1.50.443: S 1325861497:1325861497(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 12: 10:13:27.476446 x.x.x.x.12480 &amp;gt; 172.16.1.50.443: S 1626187008:1626187008(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 13: 10:13:27.727043 x.x.x.x.12484 &amp;gt; 172.16.1.50.443: S 1325861497:1325861497(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 14: 10:13:33.471151 x.x.x.x.12480 &amp;gt; 172.16.1.50.443: S 1626187008:1626187008(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 15: 10:13:33.721932 x.x.x.x.12484 &amp;gt; 172.16.1.50.443: S 1325861497:1325861497(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 16: 10:13:45.730034 x.x.x.x.13012 &amp;gt; 172.16.1.50.443: S 2308891737:2308891737(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 17: 10:13:48.722405 x.x.x.x.13012 &amp;gt; 172.16.1.50.443: S 2308891737:2308891737(0) win 8192 &amp;lt;mss 1380,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 18: 10:13:54.723961 x.x.x.x.13012 &amp;gt; 172.16.1.50.443: S 2308891737:2308891737(0) win 8192 &amp;lt;mss 1380,nop,nop,sackOK&amp;gt;&lt;BR /&gt;18 packets shown&lt;BR /&gt;XXXFW01#&lt;BR /&gt;XXXFW01#&lt;BR /&gt;XXXFW01# sh capture drop&lt;/P&gt;&lt;P&gt;11 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 10:13:12.406549 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 10:13:13.163123 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 10:13:53.175634 193.105.134.220.51710 &amp;gt; 172.16.1.50.8118: S 2897382283:2897382283(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 10:13:56.411630 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 10:13:57.161750 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 10:13:57.599624 82.28.215.152.40407 &amp;gt; 172.16.1.50.23: S 2164620322:2164620322(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 23419048 0,nop,wscale 1&amp;gt; Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 10:13:57.913191 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 10:13:58.674479 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 10:13:59.426155 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50 Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;BR /&gt;&amp;nbsp; 10: 10:14:00.185155 172.28.10.254.137 &amp;gt; 172.28.10.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 11: 10:14:00.595718 82.28.215.152.40407 &amp;gt; 172.16.1.50.23: S 2164620322:2164620322(0) win 5840 &amp;lt;mss 1460,sackOK,timestamp 23419348 0,nop,wscale 1&amp;gt; Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;11 packets shown&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 17:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764361#M177716</guid>
      <dc:creator>alex.vue</dc:creator>
      <dc:date>2015-10-14T17:22:19Z</dc:date>
    </item>
    <item>
      <title>Hi Alex,You have already</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764362#M177718</link>
      <description>&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;You have already configured the object nat your concerned traffic so you do not need manual nat :&lt;/P&gt;&lt;P&gt;object network Liebert-AC&lt;BR /&gt;&amp;nbsp;nat (dmz1,outside) static 172.16.1.50 service tcp https https&lt;/P&gt;&lt;P&gt;Have you tried removing the first nat and tested?&lt;/P&gt;&lt;P&gt;Also for the testing purpose you could try with the manual NAT statement:&lt;/P&gt;&lt;P&gt;nat (dmz1,outside) 1 source static &amp;lt;real-ip-object&amp;gt; &amp;lt;mapped-ip-object&amp;gt;&lt;/P&gt;&lt;P&gt;Also check with capture as i had mentioned in my previous reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 17:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764362#M177718</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-14T17:32:18Z</dc:date>
    </item>
    <item>
      <title>Hi Alex,I wrongly typed</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764363#M177720</link>
      <description>&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;I wrongly typed 'inside' in the capi capture instead of 'dmz1' as your server is behind dmz1. From the captures i believe that you have corrected that yourself.&lt;/P&gt;&lt;P&gt;From the capture outputs, i could only see SYN packets going to your server side. We do not see any SYN-ACK coming from Server back to ASA on the capi captures. No drops for interesting traffic.&lt;/P&gt;&lt;P&gt;Please check if there is a proper connectivity/reachability between Server and ASA. Also check the arp entry on asa 'show arp' for the server IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 19:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764363#M177720</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-14T19:42:44Z</dc:date>
    </item>
    <item>
      <title>Thank you so much Akshay.</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764364#M177722</link>
      <description>&lt;P&gt;Thank you so much Akshay. Your suggested capture helped isolate the issue. It turns out, the server firewall had blocked the incoming ports. It is working now and thank you very much for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Alex&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 20:37:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-web-server-from-the-outside/m-p/2764364#M177722</guid>
      <dc:creator>alex.vue</dc:creator>
      <dc:date>2015-10-14T20:37:07Z</dc:date>
    </item>
  </channel>
</rss>

