<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Walter,The problem seems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636266#M197426</link>
    <description>&lt;P&gt;Hi Walter,&lt;/P&gt;&lt;P&gt;The problem seems to be related to order of operation of NAT statements.&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static srv-192.168.101.10 interface service tcp-25 tcp-25&lt;/P&gt;&lt;P&gt;Check "Show Nat", your SMTP NAT statement must come before your dynamic NAT statement.&lt;/P&gt;&lt;P&gt;Twice NAT statements are executed in the order they are configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 01 Feb 2015 18:08:31 GMT</pubDate>
    <dc:creator>Poonam Garg</dc:creator>
    <dc:date>2015-02-01T18:08:31Z</dc:date>
    <item>
      <title>Port forwarding ASA 9.1(2)</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636265#M197425</link>
      <description>&lt;P&gt;Hi guys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am completely lost with my asa 5505.&lt;BR /&gt;No props forwarding ports on other cisco routers but this device is driving me nuts.&lt;/P&gt;&lt;P&gt;I have tried countless setups and followed so many examples. I have seriously no clue anymore.&lt;/P&gt;&lt;P&gt;I just want my 25 be forwarded to my mail server on the dmz interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I put my config in the attachements ( incl sh nat, sh acl)&lt;BR /&gt;What I already tried was nat on the objects itself.&lt;BR /&gt;acl with and without objects&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The strange thing is that no counters of the nat or acl are running up if I telnet on port 25 from an outside machine.&lt;BR /&gt;Also the syslog server doesn't show anything blocking on port 25.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My packet trace.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;RTR01# packet-tracer input outside tcp 4.4.4.2 smtp 192.168.101.10 25&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Implicit Rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;MAC Access list&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: input&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;in &amp;nbsp; 192.168.101.0 &amp;nbsp; 255.255.255.0 &amp;nbsp; DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-group outside_acl in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-list outside_acl extended permit tcp any object srv-192.168.101.10 eq smtp log debugging&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 4 &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: NAT&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: per-session&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 5 &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 6 &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: NAT&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: rpf-check&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: DROP &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;nat (DMZ,outside) source dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;output-interface: DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Action: drop &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;sh nat&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636265#M197425</guid>
      <dc:creator>walters199</dc:creator>
      <dc:date>2019-03-12T05:25:48Z</dc:date>
    </item>
    <item>
      <title>Hi Walter,The problem seems</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636266#M197426</link>
      <description>&lt;P&gt;Hi Walter,&lt;/P&gt;&lt;P&gt;The problem seems to be related to order of operation of NAT statements.&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static srv-192.168.101.10 interface service tcp-25 tcp-25&lt;/P&gt;&lt;P&gt;Check "Show Nat", your SMTP NAT statement must come before your dynamic NAT statement.&lt;/P&gt;&lt;P&gt;Twice NAT statements are executed in the order they are configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Feb 2015 18:08:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636266#M197426</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2015-02-01T18:08:31Z</dc:date>
    </item>
    <item>
      <title>Poonam, Thank you for your</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636267#M197427</link>
      <description>&lt;P&gt;Poonam,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;BR /&gt;I have changed a few things after this and it works now after weeks of trial and error.&lt;/P&gt;&lt;P&gt;What I changed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I removed the NAT rule on object network srv-192.168.101.10&lt;/P&gt;&lt;P&gt;I created an object service MAIL&lt;BR /&gt;service tcp source eq smtp&lt;/P&gt;&lt;P&gt;I removed the object service TCP-25 because that would constantly giving me an error that it was not mapped ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a manual NAT rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) 1 source static srv-192.168.101.10 interface service MAIL MAIL&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My acl was already in place. A telnet from a remote machine on port 25 works perfectly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh nat&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (DMZ) to (outside) source static srv-192.168.101.10 interface&amp;nbsp;&amp;nbsp; service MAIL MAIL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;2 (DMZ) to (outside) source dynamic DMZ interface &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 87, untranslate_hits = 0&lt;BR /&gt;3 (inside) to (outside) source dynamic inside interface &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 32, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So probably the auto nat function didn t work. For me I need to find out why the first time the rule under the object came under the auto nat functions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Learned a lot this time.&lt;/P&gt;&lt;P&gt;SO problem solved&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2015 07:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636267#M197427</guid>
      <dc:creator>walters199</dc:creator>
      <dc:date>2015-02-02T07:28:09Z</dc:date>
    </item>
    <item>
      <title>Hi Walter,I am happy to hear</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636268#M197428</link>
      <description>&lt;P&gt;Hi Walter,&lt;/P&gt;&lt;P&gt;I am happy to hear that your problem resolved.&lt;/P&gt;&lt;P&gt;Kindly rate the solution, if it helped you so that it will also be helpful to others.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2015 07:37:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa-9-1-2/m-p/2636268#M197428</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2015-02-02T07:37:07Z</dc:date>
    </item>
  </channel>
</rss>

