<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello,now the sh nat looks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644310#M196430</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;now the sh nat looks like.:&lt;/P&gt;&lt;P&gt;sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (Guest) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 92926, untranslate_hits = 62078&lt;BR /&gt;2 (inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 18, untranslate_hits = 14&lt;BR /&gt;3 (DMZ) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 12, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (DMZ) to (outside) source static Public_Server interface&amp;nbsp;&amp;nbsp; service tcp www www&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 47339, untranslate_hits = 21519&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (DMZ) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 11, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But it dont work :(. The packet-tracer said the the implicit deny catch it, but as you can see also there isnt hit on the NAT rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 07 Mar 2015 13:31:50 GMT</pubDate>
    <dc:creator>Attila Erdos</dc:creator>
    <dc:date>2015-03-07T13:31:50Z</dc:date>
    <item>
      <title>ASA 9.2 Port Forward</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644306#M196426</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;i have a problem with a single port forward with 9.2 ASA (5505). Here is the related config.:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.168.50.5 eq www log&lt;BR /&gt;access-list DMZ_in extended permit ip any any&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic obj_any interface&lt;BR /&gt;nat (DMZ,outside) source static any any destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;nat (outside,DMZ) source dynamic any interface destination static Public_Server Public_Server service HTTP HTTP&lt;/P&gt;&lt;P&gt;object network Public_Server&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i try to access the server, the console said ACL drops. The packet tracer said that it dropped in the implicit deny rule. Can you help me what can be the problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644306#M196426</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2019-03-12T05:36:12Z</dc:date>
    </item>
    <item>
      <title>It is probably the order of</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644307#M196427</link>
      <description>&lt;P&gt;It is probably the order of your NAT.&lt;/P&gt;&lt;P&gt;Can you post a "sh nat" from the ASA ?&lt;/P&gt;&lt;P&gt;And what is the object Public_Server, is it 10.168.50.5 ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 00:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644307#M196427</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-07T00:05:00Z</dc:date>
    </item>
    <item>
      <title>Hello, of course.sh natManual</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644308#M196428</link>
      <description>&lt;P&gt;Hello, of course.&lt;/P&gt;&lt;P&gt;sh nat&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (Guest) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 91968, untranslate_hits = 61972&lt;BR /&gt;2 (DMZ) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1734, untranslate_hits = 0&lt;BR /&gt;3 (inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 7, untranslate_hits = 7&lt;BR /&gt;4 (DMZ) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (DMZ) to (outside) source static Public_Server interface&amp;nbsp;&amp;nbsp; service tcp www www&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 42230, untranslate_hits = 20999&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, here is the public server object.:&lt;/P&gt;&lt;P&gt;object network Public_Server&lt;BR /&gt;&amp;nbsp;host 10.168.50.5&lt;/P&gt;&lt;P&gt;And here is the HTTP service object.:&lt;/P&gt;&lt;P&gt;object service HTTP&lt;BR /&gt;&amp;nbsp;service tcp destination eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 07:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644308#M196428</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-07T07:13:07Z</dc:date>
    </item>
    <item>
      <title>The problem is NAT is one</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644309#M196429</link>
      <description>&lt;P&gt;The problem is NAT and the sections ie. you have section 1 and 2 NAT. The ASA with 8.3 or later uses the sections in order so it is using the dynamic NAT statement you have for your DMZ&amp;nbsp;in section 1 for the translation and never gets to the section 2 static statement.&lt;/P&gt;&lt;P&gt;There are two solutions -&lt;/P&gt;&lt;P&gt;1) move your dynamic NAT to section 2 where your static should take precedence&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;2) move your dynamic NAT to section 3 so the static is matched first.&lt;/P&gt;&lt;P&gt;The recommendation is to use section 3 for dynamic NAT so you need to replace -&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic obj_any interface&lt;/P&gt;&lt;P&gt;with this&amp;nbsp;-&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) after-auto source&amp;nbsp;dynamic obj_any interface&lt;/P&gt;&lt;P&gt;the "after-auto" keyword moves it to section 3.&lt;/P&gt;&lt;P&gt;For full details of how it all works see this document by Jouni Forss -&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli"&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 13:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644309#M196429</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-07T13:12:39Z</dc:date>
    </item>
    <item>
      <title>Hello,now the sh nat looks</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644310#M196430</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;now the sh nat looks like.:&lt;/P&gt;&lt;P&gt;sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (Guest) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 92926, untranslate_hits = 62078&lt;BR /&gt;2 (inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 18, untranslate_hits = 14&lt;BR /&gt;3 (DMZ) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 12, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (DMZ) to (outside) source static Public_Server interface&amp;nbsp;&amp;nbsp; service tcp www www&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 47339, untranslate_hits = 21519&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (DMZ) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 11, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But it dont work :(. The packet-tracer said the the implicit deny catch it, but as you can see also there isnt hit on the NAT rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 13:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644310#M196430</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-07T13:31:50Z</dc:date>
    </item>
    <item>
      <title>Can you post the packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644311#M196431</link>
      <description>&lt;P&gt;Can you post the packet-tracer output ?&lt;/P&gt;&lt;P&gt;Are you accessing the server from the outside of the ASA ?&lt;/P&gt;&lt;P&gt;What is the IP address you are coming from ?&lt;/P&gt;&lt;P&gt;What is this meant to be doing -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (outside,DMZ) source dynamic any interface destination static Public_Server Public_Server service HTTP HTTP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 18:02:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644311#M196431</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-07T18:02:36Z</dc:date>
    </item>
    <item>
      <title>Here it is.:packet-tracer</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644312#M196432</link>
      <description>&lt;P&gt;Here it is.:&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 1.1.1.1 http &lt;EM&gt;OUTSIDEINTERFACEIP&lt;/EM&gt; http det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp;&lt;EM&gt; &amp;lt;OUTSIDE IF&amp;gt;&amp;nbsp;&lt;/EM&gt; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xad070ce8, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=250632, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xad2a1370, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=116843, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;Uh, that's interesting. That was a nat rule which with I made debug, but currently that rule is not in the running config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I coming from a random public IP, in the packet racer i tried the 1.1.1.1.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 18:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644312#M196432</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-07T18:15:22Z</dc:date>
    </item>
    <item>
      <title>Okay can you run -"packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644313#M196433</link>
      <description>&lt;P&gt;Okay can you run -&lt;/P&gt;&lt;P&gt;"packet-tracer input outside 8.8.8.8 12345 &amp;lt;outside interface IP&amp;gt; http"&lt;/P&gt;&lt;P&gt;and post results.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 18:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644313#M196433</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-07T18:25:19Z</dc:date>
    </item>
    <item>
      <title>I had to define also the tcp</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644314#M196434</link>
      <description>&lt;P&gt;I had to define also the tcp.&lt;/P&gt;&lt;P&gt;packet-tracer input outside&lt;STRONG&gt; tcp &lt;/STRONG&gt;8.8.8.8 12345 OUTIP http&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; OUTIP&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 18:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644314#M196434</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-07T18:32:33Z</dc:date>
    </item>
    <item>
      <title>Can you post full ASA config</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644315#M196435</link>
      <description>&lt;P&gt;Can you post full ASA config and -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (outside,DMZ) source dynamic any interface destination static Public_Server Public_Server service HTTP HTTP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;what is the above for ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 18:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644315#M196435</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-07T18:46:52Z</dc:date>
    </item>
    <item>
      <title>Thats an old nat rule, but</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644316#M196436</link>
      <description>&lt;P&gt;Thats an old nat rule, but currently that's not in the running config. I dont understand why is that in the nat table.&lt;/P&gt;&lt;P&gt;I attached the config, i deleted the sensitive and VPN parts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 19:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644316#M196436</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-07T19:19:32Z</dc:date>
    </item>
    <item>
      <title>Can't see anything wrong with</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644317#M196437</link>
      <description>&lt;P&gt;Can't see anything wrong with your configuration now.&lt;/P&gt;&lt;P&gt;This NAT rule -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;3 (DMZ) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 12, untranslate_hits = 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;have you actually generated traffic that would hit that rule ?&lt;/P&gt;&lt;P&gt;It should have no effect on what you are trying to do but just wondering as it would be checked before your static.&lt;/P&gt;&lt;P&gt;Other than that perhaps a reload if you can.&lt;/P&gt;&lt;P&gt;Like I say I can't see anything wrong with it now.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 19:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644317#M196437</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-07T19:50:36Z</dc:date>
    </item>
    <item>
      <title>Good day. Just a thought here</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644318#M196438</link>
      <description>&lt;P&gt;Good day. Just a thought here. You have sorted your NAT issue as per Jon. I assume your webserver is in your DMZ. However, is your&amp;nbsp;ACL entry allowing traffic from the Outside to the DMZ? It seems the "permit www" traffic statement is on the " outside access in" access rule. Can you try to add a permit access rule from outside to dmz?&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 06:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644318#M196438</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-08T06:33:26Z</dc:date>
    </item>
    <item>
      <title>I reloaded it, and re-ordered</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644319#M196440</link>
      <description>&lt;P&gt;I reloaded it, and re-ordered the NAT rules like.:&lt;/P&gt;&lt;P&gt;nat (Guest,outside) source dynamic obj_any interface&lt;BR /&gt;nat (inside,outside) source static any any destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network Public_Server&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static interface service tcp www www&lt;BR /&gt;!&lt;BR /&gt;nat (DMZ,outside) after-auto source dynamic obj_any interface&lt;BR /&gt;nat (DMZ,outside) after-auto source static any any destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But it still dont works.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 06:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644319#M196440</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-08T06:48:54Z</dc:date>
    </item>
    <item>
      <title>As you can see on the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644320#M196442</link>
      <description>&lt;P&gt;As you can see on the outside interface there are many ACLs whichs permit the traffic (more then one because of test), and currently on the DMZ interface there is a permit any any rule.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 06:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644320#M196442</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-08T06:51:23Z</dc:date>
    </item>
    <item>
      <title>Can you do a "show nat" again</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644321#M196447</link>
      <description>&lt;P&gt;Can you do a "show nat" again please?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 11:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644321#M196447</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-08T11:28:11Z</dc:date>
    </item>
    <item>
      <title>Of course. sh natManual NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644322#M196448</link>
      <description>&lt;P&gt;Of course.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (Guest) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 45, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (DMZ) to (outside) source static Public_Server interface&amp;nbsp;&amp;nbsp; service tcp www www&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (DMZ) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 765, untranslate_hits = 1&lt;BR /&gt;2 (DMZ) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 11:30:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644322#M196448</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-08T11:30:34Z</dc:date>
    </item>
    <item>
      <title>The "Public_Server" object is</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644323#M196449</link>
      <description>&lt;P&gt;The "Public_Server" object is still 10.168.50.5. I don't see it in your amended rule order above. It's strange that you're getting lots of hits on the "after-auto" rule. But not on the Object rule....... which should apply first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to test, can you try this?&lt;/P&gt;&lt;P&gt;Make sure the object Public_Server is set as host 10.168.50.5, then the NAT rule as you have it in the post above. Then remove the 2 DMZ "after-auto" rules. Then test again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That section 3 number1 rule is bothering me a bit. What is the purpose of that rule? To provide internet access for traffic sourced from the DMZ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 11:43:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644323#M196449</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-08T11:43:37Z</dc:date>
    </item>
    <item>
      <title>Hi AndreIt's confusing isn't</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644324#M196450</link>
      <description>&lt;P&gt;Hi Andre&lt;/P&gt;&lt;P&gt;It's confusing isn't it because I can't see anything wrong with it now.&lt;/P&gt;&lt;P&gt;The section 3 dynamic PAT is only there because it was originally in section 1 so I assumed it must be needed in terms of DMZ machines sourcing traffic to the internet.&lt;/P&gt;&lt;P&gt;So I just moved it past section 2 to make sure the statics were used but the ASA seems to be completely ignoring them for some reason.&lt;/P&gt;&lt;P&gt;Which would suggest something was matching in section 1 or in section 2 before the static PAT but none of the NAT statements in those sections would match as a far as I can see.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 12:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644324#M196450</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-08T12:22:49Z</dc:date>
    </item>
    <item>
      <title>Yes, the Public_server is the</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644325#M196451</link>
      <description>&lt;P&gt;Yes, the Public_server is the 10.168.50.5.:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Public_Server&lt;BR /&gt;&amp;nbsp;host 10.168.50.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I deleted them, currently.:&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (Guest) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 45, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static VPN_Pool VPN_Pool no-proxy-arp route-lookup&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (DMZ) to (outside) source static Public_Server interface&amp;nbsp;&amp;nbsp; service tcp www www&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, that NAT rule makes internet access for the clients in DMZ.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2015 12:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-2-port-forward/m-p/2644325#M196451</guid>
      <dc:creator>Attila Erdos</dc:creator>
      <dc:date>2015-03-08T12:28:15Z</dc:date>
    </item>
  </channel>
</rss>

