<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, these are the lines in in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748008#M177868</link>
    <description>&lt;P&gt;Yes, these are the lines in place:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;access-list 100 extended permit tcp any host 192.168.1.55 eq www&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;192.168.1.55 eq https&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;192.168.1.55 eq smtp&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;access-list 100 extended permit tcp any host 100.100.100.100 eq www&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;100.100.100.100 eq https&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;100.100.100.100 eq smtp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Oct 2015 01:29:17 GMT</pubDate>
    <dc:creator>richdodson</dc:creator>
    <dc:date>2015-10-12T01:29:17Z</dc:date>
    <item>
      <title>ASA 9.4 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748004#M177864</link>
      <description>&lt;P&gt;I was converting a client today from 8.2 to 9.4, which involved a lot of NAT changes.&amp;nbsp; I didn't think this would be all that big of a deal, but I ran into a road block I didn't know how to get past.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They have an internal Exchange server that accepts outside connections to ports 25, 80 &amp;amp; 443 on the external interface.&amp;nbsp; The previous NAT statements are as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;192.168.1.55 = Exchange Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;static (inside,outside) tcp interface www 192.168.1.55 www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface https 192.168.1.55 https netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface smtp 192.168.1.55 smtp netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I replaced those statements with the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;object network ExchangeServer&lt;BR /&gt;&amp;nbsp;host 192.168.1.55&lt;BR /&gt;object service ExchangeSMTP&lt;BR /&gt;&amp;nbsp;service tcp destination eq smtp&lt;BR /&gt;object service ExchangeWWW&lt;BR /&gt;&amp;nbsp;service tcp destination eq www&lt;BR /&gt;object service ExchangeHTTPS&lt;BR /&gt;&amp;nbsp;service tcp destination eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;nat (inside,outside) source static ExchangeServer interface service ExchangeSMTP ExchangeSMTP&lt;BR /&gt;nat (inside,outside) source static ExchangeServer interface service ExchangeWWW ExchangeWWW&lt;BR /&gt;nat (inside,outside) source static ExchangeServer interface service ExchangeHTTPS ExchangeHTTPS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My connections were not accepted, however.&amp;nbsp; When I ran packet tracer, it seemed as if the NAT statement was not having any effect:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;100.100.100.100 is the sanitized outside interface IP address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;asa# packet-tracer input outside tcp 4.4.4.4 5555&amp;nbsp;100.100.100.100 443 detail&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop&amp;nbsp;100.100.100.100 using egress ifc&amp;nbsp; identity&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffdd8dcbf0, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14891, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffddb402d0, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5066, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;asa#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can provide any more information that might be necessary.&amp;nbsp; Would be very grateful for any clues in the right direction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;-Richard&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748004#M177864</guid>
      <dc:creator>richdodson</dc:creator>
      <dc:date>2019-03-12T06:43:43Z</dc:date>
    </item>
    <item>
      <title>Hi,Do you have access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748005#M177865</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Do you have access-list rule to allow outside connections on those ports to Inside? If existing, ACL applied to outside interface? Based on the packet tracer result, looks like ACL is the issue.&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 01:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748005#M177865</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2015-10-12T01:18:31Z</dc:date>
    </item>
    <item>
      <title>Yes, I have an access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748006#M177866</link>
      <description>&lt;P&gt;Yes, I have an access-list line that's permitting any traffic to both the internal and the external IP addresses on those services.&amp;nbsp; My understanding is that I'll only need the internal IP address rule, but I have both to be sure for now.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 01:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748006#M177866</guid>
      <dc:creator>richdodson</dc:creator>
      <dc:date>2015-10-12T01:20:37Z</dc:date>
    </item>
    <item>
      <title>hi,you're packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748007#M177867</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;you're packet tracer output says it dropped the connection due to ACL.&lt;/P&gt;&lt;P&gt;did you allow outside IP and TCP ports 25, 80 and 443 to real/local IP 192.168.1.55.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 01:25:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748007#M177867</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-10-12T01:25:47Z</dc:date>
    </item>
    <item>
      <title>Yes, these are the lines in</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748008#M177868</link>
      <description>&lt;P&gt;Yes, these are the lines in place:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;access-list 100 extended permit tcp any host 192.168.1.55 eq www&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;192.168.1.55 eq https&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;192.168.1.55 eq smtp&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;access-list 100 extended permit tcp any host 100.100.100.100 eq www&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;100.100.100.100 eq https&lt;BR /&gt;access-list 100 extended permit tcp any host&amp;nbsp;100.100.100.100 eq smtp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 01:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748008#M177868</guid>
      <dc:creator>richdodson</dc:creator>
      <dc:date>2015-10-12T01:29:17Z</dc:date>
    </item>
    <item>
      <title>yes, i agree with MS.did you</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748009#M177869</link>
      <description>&lt;P&gt;yes, i agree with MS.&lt;/P&gt;&lt;P&gt;did you apply the ACL with the &lt;STRONG&gt;access-group &amp;lt;ACL NAME&amp;gt; outside in &lt;/STRONG&gt;command?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 01:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748009#M177869</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-10-12T01:31:36Z</dc:date>
    </item>
    <item>
      <title>Yes, I have.  The access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748010#M177870</link>
      <description>&lt;P&gt;Yes, I have.&amp;nbsp; The access-list is working for other nat rules that are in the following format:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;object network TSInside&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static TSOutside dns&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 01:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748010#M177870</guid>
      <dc:creator>richdodson</dc:creator>
      <dc:date>2015-10-12T01:47:59Z</dc:date>
    </item>
    <item>
      <title>hi,the command access-list is</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748011#M177872</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;the command &lt;STRONG&gt;access-list&lt;/STRONG&gt; is different from &lt;STRONG&gt;access-group&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;could you do a &lt;STRONG&gt;show run access-group&lt;/STRONG&gt; and post it here?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 01:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748011#M177872</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-10-12T01:48:43Z</dc:date>
    </item>
    <item>
      <title>asa# show run access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748012#M177874</link>
      <description>&lt;P style="margin-left: 40px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;asa# show run access-group&lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;access-group 101 in interface inside&lt;BR /&gt;access-group dmz_access_in in interface DMZ&lt;BR /&gt;access-group GuestWifi_access_in in interface GuestWifi&lt;BR /&gt;asa# &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 03:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748012#M177874</guid>
      <dc:creator>richdodson</dc:creator>
      <dc:date>2015-10-12T03:03:17Z</dc:date>
    </item>
    <item>
      <title>A big thank you to Juan</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748013#M177876</link>
      <description>&lt;P&gt;A big thank you to Juan Grajales at Cisco TAC for helping me solve this issue.&amp;nbsp; I would also like to thank johnlloyd_13 and &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;mvsheik123 for their &lt;/SPAN&gt;input.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There were two problems working against me, one was the service entries:&lt;/P&gt;&lt;P&gt;&lt;FONT face="Courier New"&gt;object service ExchangeSMTP&lt;BR /&gt;&amp;nbsp;service tcp destination eq smtp&lt;BR /&gt;object service ExchangeWWW&lt;BR /&gt;&amp;nbsp;service tcp destination eq www&lt;BR /&gt;object service ExchangeHTTPS&lt;BR /&gt;&amp;nbsp;service tcp destination eq https&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;all need to be changed to the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Courier New"&gt;object service ExchangeSMTP&lt;BR /&gt;&amp;nbsp;service tcp&amp;nbsp;source eq smtp&lt;BR /&gt;object service ExchangeWWW&lt;BR /&gt;&amp;nbsp;service tcp&amp;nbsp;source eq www&lt;BR /&gt;object service ExchangeHTTPS&lt;BR /&gt;&amp;nbsp;service tcp&amp;nbsp;source eq https&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other issue working against me was the order of the NAT entries.&amp;nbsp; These lines:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;static (inside,outside) tcp interface www 192.168.1.55 www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface https 192.168.1.55 https netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface smtp 192.168.1.55 smtp netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need to be above these lines:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;nat (inside,outside) source dynamic InsideNetworks interface&lt;BR /&gt;nat (DMZ,outside) source dynamic DMZNetworks interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I realize this problem couldn't have been seen based off of my original post, but I wanted to make sure I included this in the answer.&amp;nbsp; Static interface nat entries need to be placed above dynamic interface nat entries, otherwise the dynamic entries take precedence.&amp;nbsp; I hope this helps anyone else who has experienced this issue or may experience this in the future.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 22:49:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-4-nat-issue/m-p/2748013#M177876</guid>
      <dc:creator>richdodson</dc:creator>
      <dc:date>2015-10-12T22:49:19Z</dc:date>
    </item>
  </channel>
</rss>

