<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is the real server reachable in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751034#M192447</link>
    <description>&lt;P&gt;Is the real server&amp;nbsp;IP&amp;nbsp;reachable via the inside interface ?&lt;/P&gt;&lt;P&gt;If so this rule -&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; no-proxy-arp route-lookup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;is the one that seems to be matching the traffic.&lt;/P&gt;&lt;P&gt;What is that rule meant to be doing ?&lt;/P&gt;&lt;P&gt;Jon&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Aug 2015 14:04:31 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2015-08-24T14:04:31Z</dc:date>
    <item>
      <title>NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751029#M192435</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;I am having an issue whereby all my static NAT rules are failing.&lt;/P&gt;&lt;P&gt;ASDM Logging states:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4&amp;nbsp;Aug 24 2015&amp;nbsp;06:42:46&amp;nbsp;106023&amp;nbsp;213.x.x.58&amp;nbsp;59500&amp;nbsp;Out-TMG_RIPE_NAT&amp;nbsp;443&amp;nbsp;Deny tcp src outside:213.205.251.58/59500 dst outside:Out-TMG_RIPE_NAT/443 by access-group "outside_access_in" [0x0, 0x0]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have run a packet tracer as follows to 213.205.251.58:443:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 213.x.x.58&amp;nbsp;65500 10.x.x.106 tcp 213.x.x.58 65500 10.x.x.106 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Packet tracer output is attached.&lt;/P&gt;&lt;P&gt;Any help is much appreciated!&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751029#M192435</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2019-03-12T06:29:15Z</dc:date>
    </item>
    <item>
      <title>You should test with packet</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751030#M192437</link>
      <description>&lt;P&gt;You should test with packet tracer using the public IP as the destination not the private IP.&lt;/P&gt;&lt;P&gt;Can you run it again and also post a "sh nat" from the ASA.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 12:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751030#M192437</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-24T12:48:55Z</dc:date>
    </item>
    <item>
      <title>Hi Jon,Here is the packet</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751031#M192439</link>
      <description>&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;Here is the packet tracer using the public IP:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 213.x.x.58 65500 212.x.x.243 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 212.x.x.224 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also please find attached 'sh nat'.&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 13:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751031#M192439</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2015-08-24T13:40:45Z</dc:date>
    </item>
    <item>
      <title>I think the issue is with</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751032#M192441</link>
      <description>&lt;P&gt;I think the issue is with your NAT configuration.&lt;/P&gt;&lt;P&gt;Firstly if that is your real public IP can you modify ie. 212.x.x.243 as this is a public forum (apologies I should have mentioned that).&lt;/P&gt;&lt;P&gt;Then -&lt;/P&gt;&lt;P&gt;1) "clear nat counters"&lt;/P&gt;&lt;P&gt;run a "sh nat" and you should see all the counters cleared&lt;/P&gt;&lt;P&gt;2) run the packet-tracer command again and post "sh nat" again.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 13:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751032#M192441</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-24T13:40:46Z</dc:date>
    </item>
    <item>
      <title>All done. :)Please find</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751033#M192443</link>
      <description>&lt;P&gt;All done. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Please find attached.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 13:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751033#M192443</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2015-08-24T13:53:27Z</dc:date>
    </item>
    <item>
      <title>Is the real server reachable</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751034#M192447</link>
      <description>&lt;P&gt;Is the real server&amp;nbsp;IP&amp;nbsp;reachable via the inside interface ?&lt;/P&gt;&lt;P&gt;If so this rule -&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; no-proxy-arp route-lookup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;is the one that seems to be matching the traffic.&lt;/P&gt;&lt;P&gt;What is that rule meant to be doing ?&lt;/P&gt;&lt;P&gt;Jon&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 14:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751034#M192447</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-24T14:04:31Z</dc:date>
    </item>
    <item>
      <title>Thanks for your help so far</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751035#M192449</link>
      <description>&lt;P&gt;Rule 13:&lt;/P&gt;&lt;P&gt;13 (inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 22819, untranslate_hits = 4898&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I disable this rule the problem is solved! Thank you for all your help.&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 14:27:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2751035#M192449</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2015-08-24T14:27:32Z</dc:date>
    </item>
  </channel>
</rss>

