<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That is correct  (see router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720262#M193402</link>
    <description>&lt;P&gt;That is correct&amp;nbsp; (see router below).&amp;nbsp; I have been scratching my head on this for two days now and cant figure it out.&amp;nbsp; But I think it has something to do with the NAT statements on the FW or Router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cLAB-EF1# packet-tracer in inside icmp 10.200.0.2 8 0 8.8.8.8 de&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl-inside in interface inside&lt;BR /&gt;access-list acl-inside extended permit ip any4 any4&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8c561e0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=799, user_data=0x7ffec0997b00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_inside&lt;BR /&gt;&amp;nbsp;nat (inside,Outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.200.0.2/0 to 10.200.1.2/53778&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffebcff3240, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=136, user_data=0x7ffebcfe9260, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.200.0.0, mask=255.255.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec7da5b80, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14031, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8a4d790, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2161, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec9982c40, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=56, user_data=0x7ffec997ef20, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8a4d0c0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=80, user_data=0x7ffec8a4c630, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffeca439af0, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=15, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffeca439550, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=71, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec7da5b80, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14033, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8912730, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12013, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 13217, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;cLAB-EF1(config)# ping 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# ping 10.200.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.200.1.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;cLAB-EF1# ping 10.200.0.4&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.200.0.4, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;BR /&gt;cLAB-EF1#&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# ping 63.128.68.13&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 63.128.68.13, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# sh run route&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 10.200.1.1 1&lt;BR /&gt;route inside 10.200.0.0 255.255.255.0 10.200.0.4 1&lt;/P&gt;&lt;P&gt;Gateway of last resort is 10.200.1.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0 255.255.255.0 [1/0] via 10.200.0.4, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0 255.255.255.248 is directly connected, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.0 255.255.255.0 is directly connected, Outside&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.128.68.12 255.255.255.252 [110/11] via 10.200.1.1, 24:01:54, Outside&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 10.200.1.1, Outside&lt;BR /&gt;cLAB-EF1#&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# sh run nat&lt;BR /&gt;nat (inside,Outside) source static cLAB_NETWORK cLAB_NETWORK destination static&lt;BR /&gt;nat (inside,Outside) source static obj_inside obj_inside destination static obj-ANYCONNECT obj-ANYCONNECT&lt;BR /&gt;!&lt;BR /&gt;object network obj_inside&lt;BR /&gt;&amp;nbsp;nat (inside,Outside) dynamic interface&lt;BR /&gt;object network obj_management&lt;BR /&gt;&amp;nbsp;nat (Management,Outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 63.128.68.13 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0/0 [1/0] via 63.128.68.13&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.0/8 is variably subnetted, 6 subnets, 4 masks&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.0/8 is directly connected, GigabitEthernet0/1&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.200.254/32 is directly connected, Loopback0&lt;BR /&gt;O E1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0/24 [110/31] via 10.200.1.2, 23:01:57, GigabitEthernet0/1&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0/29 [110/11] via 10.200.1.2, 23:48:35, GigabitEthernet0/1&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.0/24 is directly connected, GigabitEthernet0/1&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.1/32 is directly connected, GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.0.0.0/8 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.128.68.12/30 is directly connected, GigabitEthernet0/0&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.128.68.14/32 is directly connected, GigabitEthernet0/0&lt;BR /&gt;cLAB-ER1#&lt;/P&gt;&lt;P&gt;cLAB-ER1(config)#do sh run | in ip nat&lt;BR /&gt;ip nat inside source static udp 10.200.1.2 500 interface GigabitEthernet0/0 500&lt;BR /&gt;ip nat inside source static udp 10.200.1.2 4500 interface GigabitEthernet0/0 4500&lt;BR /&gt;ip nat inside source static esp 10.200.1.2 interface GigabitEthernet0/0&lt;BR /&gt;ip nat inside source static tcp 10.200.1.2 443 interface GigabitEthernet0/0 443&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;cLAB-ER1#sh&amp;nbsp; ip nat translations&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;esp 63.128.68.14:0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.2:0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 63.128.68.14:443&amp;nbsp;&amp;nbsp; 10.200.1.2:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;udp 63.128.68.14:500&amp;nbsp;&amp;nbsp; 10.200.1.2:500&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;udp 63.128.68.14:4500&amp;nbsp; 10.200.1.2:4500&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;/P&gt;&lt;P&gt;cLAB-ER1(config)#do ping 10.200.0.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.200.0.4, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;cLAB-ER1(config)#do ping 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms&lt;/P&gt;&lt;P&gt;cLAB-ER1#ping 63.128.68.13&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 63.128.68.13, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;cLAB-ER1#sh arp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Protocol&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Age (min)&amp;nbsp; Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;BR /&gt;Internet&amp;nbsp; 10.1.255.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 214&amp;nbsp;&amp;nbsp; 0006.f6e6.90b9&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/1&lt;BR /&gt;Internet&amp;nbsp; 10.200.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; e02f.6ddf.b6e1&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/1&lt;BR /&gt;Internet&amp;nbsp; 10.200.1.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15&amp;nbsp;&amp;nbsp; 0006.f6e6.90b9&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/1&lt;BR /&gt;Internet&amp;nbsp; 63.128.68.13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 231&amp;nbsp;&amp;nbsp; 001c.b147.ec00&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/0&lt;BR /&gt;Internet&amp;nbsp; 63.128.68.14&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; e02f.6ddf.b6e0&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/0&lt;/P&gt;</description>
    <pubDate>Sat, 25 Jul 2015 21:40:00 GMT</pubDate>
    <dc:creator>Elijah Conn</dc:creator>
    <dc:date>2015-07-25T21:40:00Z</dc:date>
    <item>
      <title>Another "(acl-drop) Flow is denied by configured rule" Issue</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720258#M193393</link>
      <description>&lt;P&gt;I have a Nexus 5k with a 10k sfp configured for vlan 800 along with another port also configured for 800.&amp;nbsp; This goes into an edge router which then goes into the outside interface of an&amp;nbsp; asa 5545 (had to do it this way temporarily because I did not have a transceiver and ISP has fiber).&amp;nbsp; I can ping outside and inside from the edge router but can't even ping the ISP interface on the router from the FW.&amp;nbsp; I think its a nat problem, but I can't figure it out.&lt;/P&gt;&lt;P&gt;packet-tracer in outside icmp 10.200.1.2 8 0 8.8.8.8 de&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8c31690, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=9617, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.200.1.2, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;nat (inside,Outside) source static obj_inside obj_inside destination static obj-ANYCONNECT obj-ANYCONNECT&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;object network obj_inside&lt;BR /&gt;&amp;nbsp;nat (inside,Outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_outside&lt;BR /&gt;&amp;nbsp;subnet 10.200.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj_inside&lt;BR /&gt;&amp;nbsp;subnet 10.200.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network obj-ANYCONNECT&lt;BR /&gt;&amp;nbsp;subnet 10.200.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be appreciated, thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720258#M193393</guid>
      <dc:creator>Elijah Conn</dc:creator>
      <dc:date>2019-03-12T06:19:49Z</dc:date>
    </item>
    <item>
      <title>Your packet-tracer says you</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720259#M193395</link>
      <description>&lt;P&gt;Your packet-tracer says you are initiating from an outside host 10.200.1.2 and expect to reach&amp;nbsp;8.8.8.8. Would you expect that to be out some other interface? The logic seems opposite what we would normally see.&lt;/P&gt;&lt;P&gt;Your NAT is setup consistent with more standard logical configuration - trusted hosts on inside being NATted to the outside interface address unless they are going to VPN pool addresses.&lt;/P&gt;&lt;P&gt;A diagram would help here.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2015 03:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720259#M193395</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-25T03:05:57Z</dc:date>
    </item>
    <item>
      <title>Thank you so much for your</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720260#M193398</link>
      <description>&lt;P&gt;Thank you so much for your response.&amp;nbsp; Yes this is an unorthodox setup.&amp;nbsp; The only sfp port available to us was on the Nexus 5k so we had to use that as a L2 edge switch.&amp;nbsp; I can ping the outside from the router, but cannot from the ASA.&amp;nbsp; I am also able to ping the inside from the router as well&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2015 05:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720260#M193398</guid>
      <dc:creator>Elijah Conn</dc:creator>
      <dc:date>2015-07-25T05:47:14Z</dc:date>
    </item>
    <item>
      <title>The packet-tracer you started</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720261#M193400</link>
      <description>&lt;P&gt;The packet-tracer you started the thread with should be simulating a flow THROUGH the ASA - not from it as your example shows. So try something like:&lt;/P&gt;

&lt;PRE&gt;
&lt;SPAN style="font-size: 14.3999996185303px;"&gt;packet-tracer in inside icmp 10.200.0.2 8 0 8.8.8.8 de&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P&gt;That should be allowed assuming your default (or learned) route from the ASA to all things Internet-based is on the outside interface.&lt;/P&gt;
&lt;P&gt;When a packet leaves the ASA outside interface you diagram shows it hitting your&amp;nbsp;router. Since your ASA outside interface has a private IP address, your NAT must be taking place on the router - correct?&lt;/P&gt;
&lt;P&gt;The router's far side interface is connected to your ISP via a switched&amp;nbsp;layer 2 interface&amp;nbsp;on the Nexus 5k. The VLAN for that interface should be unique to the router and ISP connection.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2015 17:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720261#M193400</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-25T17:46:51Z</dc:date>
    </item>
    <item>
      <title>That is correct  (see router</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720262#M193402</link>
      <description>&lt;P&gt;That is correct&amp;nbsp; (see router below).&amp;nbsp; I have been scratching my head on this for two days now and cant figure it out.&amp;nbsp; But I think it has something to do with the NAT statements on the FW or Router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cLAB-EF1# packet-tracer in inside icmp 10.200.0.2 8 0 8.8.8.8 de&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl-inside in interface inside&lt;BR /&gt;access-list acl-inside extended permit ip any4 any4&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8c561e0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=799, user_data=0x7ffec0997b00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_inside&lt;BR /&gt;&amp;nbsp;nat (inside,Outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.200.0.2/0 to 10.200.1.2/53778&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffebcff3240, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=136, user_data=0x7ffebcfe9260, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.200.0.0, mask=255.255.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec7da5b80, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14031, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8a4d790, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2161, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec9982c40, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=56, user_data=0x7ffec997ef20, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8a4d0c0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=80, user_data=0x7ffec8a4c630, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffeca439af0, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=15, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffeca439550, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=71, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec7da5b80, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14033, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8912730, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12013, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 13217, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;cLAB-EF1(config)# ping 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# ping 10.200.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.200.1.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;cLAB-EF1# ping 10.200.0.4&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.200.0.4, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;BR /&gt;cLAB-EF1#&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# ping 63.128.68.13&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 63.128.68.13, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# sh run route&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 10.200.1.1 1&lt;BR /&gt;route inside 10.200.0.0 255.255.255.0 10.200.0.4 1&lt;/P&gt;&lt;P&gt;Gateway of last resort is 10.200.1.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0 255.255.255.0 [1/0] via 10.200.0.4, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0 255.255.255.248 is directly connected, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.0 255.255.255.0 is directly connected, Outside&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.128.68.12 255.255.255.252 [110/11] via 10.200.1.1, 24:01:54, Outside&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 10.200.1.1, Outside&lt;BR /&gt;cLAB-EF1#&lt;/P&gt;&lt;P&gt;cLAB-EF1(config)# sh run nat&lt;BR /&gt;nat (inside,Outside) source static cLAB_NETWORK cLAB_NETWORK destination static&lt;BR /&gt;nat (inside,Outside) source static obj_inside obj_inside destination static obj-ANYCONNECT obj-ANYCONNECT&lt;BR /&gt;!&lt;BR /&gt;object network obj_inside&lt;BR /&gt;&amp;nbsp;nat (inside,Outside) dynamic interface&lt;BR /&gt;object network obj_management&lt;BR /&gt;&amp;nbsp;nat (Management,Outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 63.128.68.13 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0/0 [1/0] via 63.128.68.13&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.0/8 is variably subnetted, 6 subnets, 4 masks&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.0/8 is directly connected, GigabitEthernet0/1&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.200.254/32 is directly connected, Loopback0&lt;BR /&gt;O E1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0/24 [110/31] via 10.200.1.2, 23:01:57, GigabitEthernet0/1&lt;BR /&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.0.0/29 [110/11] via 10.200.1.2, 23:48:35, GigabitEthernet0/1&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.0/24 is directly connected, GigabitEthernet0/1&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.1/32 is directly connected, GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.0.0.0/8 is variably subnetted, 2 subnets, 2 masks&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.128.68.12/30 is directly connected, GigabitEthernet0/0&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63.128.68.14/32 is directly connected, GigabitEthernet0/0&lt;BR /&gt;cLAB-ER1#&lt;/P&gt;&lt;P&gt;cLAB-ER1(config)#do sh run | in ip nat&lt;BR /&gt;ip nat inside source static udp 10.200.1.2 500 interface GigabitEthernet0/0 500&lt;BR /&gt;ip nat inside source static udp 10.200.1.2 4500 interface GigabitEthernet0/0 4500&lt;BR /&gt;ip nat inside source static esp 10.200.1.2 interface GigabitEthernet0/0&lt;BR /&gt;ip nat inside source static tcp 10.200.1.2 443 interface GigabitEthernet0/0 443&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;cLAB-ER1#sh&amp;nbsp; ip nat translations&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;esp 63.128.68.14:0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.1.2:0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 63.128.68.14:443&amp;nbsp;&amp;nbsp; 10.200.1.2:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;udp 63.128.68.14:500&amp;nbsp;&amp;nbsp; 10.200.1.2:500&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;udp 63.128.68.14:4500&amp;nbsp; 10.200.1.2:4500&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;/P&gt;&lt;P&gt;cLAB-ER1(config)#do ping 10.200.0.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.200.0.4, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;cLAB-ER1(config)#do ping 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms&lt;/P&gt;&lt;P&gt;cLAB-ER1#ping 63.128.68.13&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 63.128.68.13, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;cLAB-ER1#sh arp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Protocol&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Age (min)&amp;nbsp; Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;BR /&gt;Internet&amp;nbsp; 10.1.255.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 214&amp;nbsp;&amp;nbsp; 0006.f6e6.90b9&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/1&lt;BR /&gt;Internet&amp;nbsp; 10.200.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; e02f.6ddf.b6e1&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/1&lt;BR /&gt;Internet&amp;nbsp; 10.200.1.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15&amp;nbsp;&amp;nbsp; 0006.f6e6.90b9&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/1&lt;BR /&gt;Internet&amp;nbsp; 63.128.68.13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 231&amp;nbsp;&amp;nbsp; 001c.b147.ec00&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/0&lt;BR /&gt;Internet&amp;nbsp; 63.128.68.14&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; e02f.6ddf.b6e0&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet0/0&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2015 21:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720262#M193402</guid>
      <dc:creator>Elijah Conn</dc:creator>
      <dc:date>2015-07-25T21:40:00Z</dc:date>
    </item>
    <item>
      <title>Ok, I figured it out.  One</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720263#M193404</link>
      <description>&lt;P&gt;Ok, I figured it out.&amp;nbsp; One word "overload", smh&lt;/P&gt;&lt;P&gt;ip nat inside source list NAT int g 0/0 over was added to the router and presto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as far as pinging the inside interface from the router, this will not be possible because of the translations on the fw.&amp;nbsp; This is not really needed since the router acts as a passthrough.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2015 22:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720263#M193404</guid>
      <dc:creator>Elijah Conn</dc:creator>
      <dc:date>2015-07-25T22:11:51Z</dc:date>
    </item>
    <item>
      <title>Glad it's working for you.</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720264#M193406</link>
      <description>&lt;P&gt;Glad it's working for you. Thanks for the rating.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jul 2015 04:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/2720264#M193406</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-26T04:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: Another "(acl-drop) Flow is denied by configured rule" I</title>
      <link>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/5258595#M1119427</link>
      <description>&lt;P&gt;Hi Team,&amp;nbsp;&lt;BR /&gt;after create acl i getting acl action is drop , could help to resolve this issue becuase when i checking show access-list | i i am able to see hitcount .&lt;BR /&gt;&lt;BR /&gt;what to do please advise.&lt;BR /&gt;packet-tracer input ouTSIDE tcp 103.214.158.32 1234 10.156.2.142 443 Action: drop Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 07:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-quot-acl-drop-flow-is-denied-by-configured-rule-quot/m-p/5258595#M1119427</guid>
      <dc:creator>hanumat-lodha</dc:creator>
      <dc:date>2025-02-10T07:51:58Z</dc:date>
    </item>
  </channel>
</rss>

