<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,I think as per this output in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568154#M201925</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think as per this output , I don't see any issues with the NAT statement.&lt;/P&gt;&lt;P&gt;Are you seeing the Xlate error in Syslogs ? If yes , post some messages or the screenshot of the tracer which you run from the ASDM.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
    <pubDate>Wed, 24 Dec 2014 14:51:18 GMT</pubDate>
    <dc:creator>Vibhor Amrodia</dc:creator>
    <dc:date>2014-12-24T14:51:18Z</dc:date>
    <item>
      <title>nat-xlate-failed) NAT failed</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568151#M201922</link>
      <description>&lt;P&gt;For the life of me, I can't figure out what is causing my NAT problem. I ran a packet trace from 10.0.0.1 to 8.8.8.8 and received "(nat-xlate-failed)NAT failed" message. All I'm trying to do is to allow any host from 10.1.1.5 subnet to go out to the Internet 69.33.71.145, and if this connection fail, then go to the router 10.1.1.1 so I can go out to the Internet via 63.156.144.5.&lt;/P&gt;&lt;P&gt;I know the answer is probably glaring at me, but any help will be greatly appreciated. TIA.&lt;/P&gt;&lt;P&gt;ASA Version 9.0(3)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;!&lt;BR /&gt;name 10.0.0.0 Internal&lt;BR /&gt;name 63.156.144.0 Lab-Inet1 description ATT Internet Connection&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.1.5 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 69.33.71.146 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp;description Guest Network&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.3.3.5 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.1.1.31&lt;BR /&gt;&amp;nbsp;domain-name somebody.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network Internal&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-0.0.0.0&lt;BR /&gt;&amp;nbsp;host 0.0.0.0&lt;BR /&gt;object network Lab-Inet1&lt;BR /&gt;&amp;nbsp;subnet 63.156.144.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit esp any4 any4&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit ah any4 any4&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit gre any4 any4&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any4 any4 eq isakmp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp host 69.33.71.145 any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP any any eq domain log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit icmp any any log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq www log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq https log disable&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip any4 any4&amp;nbsp;&lt;BR /&gt;access-list outside_access_in_1 extended permit ip host 69.33.71.145 any&amp;nbsp;&lt;BR /&gt;access-list outside_access_in_1 extended permit ip object Terracon-Inet1 any4&amp;nbsp;&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any4 any4&amp;nbsp;&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;icmp unreachable rate-limit 100 burst-size 10&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit Lab-Inet1 255.255.255.128 outside&lt;BR /&gt;icmp permit host 69.33.71.145 outside&lt;BR /&gt;icmp permit host 8.8.8.8 outside&lt;BR /&gt;asdm image disk0:/asdm-722.bin&lt;BR /&gt;asdm location Internal 255.0.0.0 inside&lt;BR /&gt;asdm location Lab-Inet1 255.255.255.128 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network Internal&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in_1 in interface inside control-plane&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in_1 in interface outside control-plane&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 69.33.71.145 1 track 1&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 10.1.1.1 2&lt;BR /&gt;route inside Internal 255.0.0.0 10.1.1.1 1&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http server session-timeout 20&lt;BR /&gt;http 10.1.1.0 255.255.255.0 inside&lt;BR /&gt;http Lab-Inet1 255.255.255.128 outside&lt;BR /&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 69.33.71.145 interface outside&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;timeout 2000&lt;BR /&gt;&amp;nbsp;threshold 2000&lt;BR /&gt;&amp;nbsp;frequency 10&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 1 reachability&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.1.1.0 255.255.255.0 inside&lt;BR /&gt;ssh Lab-Inet1 255.255.255.128 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;username admin password alblkeIIkehw encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map tcp-traffic&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 1472&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp error&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect pptp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map dynamic-filter-snoop&amp;nbsp;&lt;BR /&gt;&amp;nbsp;class tcp-traffic&lt;BR /&gt;policy-map type inspect ipsec-pass-thru IPSEC-Passthrough&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; esp timeout 1:00:00&amp;nbsp;&lt;BR /&gt;&amp;nbsp; ah timeout 1:00:00&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:084ac25aefe3adedcbb6f09a7e117640&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568151#M201922</guid>
      <dc:creator>isabellat</dc:creator>
      <dc:date>2019-03-12T05:15:35Z</dc:date>
    </item>
    <item>
      <title>Hi,This would work only in</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568152#M201923</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This would work only in the case when you have the Outside interface working and then the internet should work fine.&lt;/P&gt;&lt;P&gt;If the outside interface is not enabled , you would need a U-TURN NAT to take the traffic from the Inside interface and route it&amp;nbsp; back to the inside interface.&lt;/P&gt;&lt;P&gt;When the Outside interface is down , can you send the output of packet trace:-&lt;/P&gt;&lt;P&gt;packet trace inout inside 10.0.0.1 4567 8.8.8.8 80 det&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2014 12:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568152#M201923</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-12-24T12:34:37Z</dc:date>
    </item>
    <item>
      <title>The outside interface is</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568153#M201924</link>
      <description>&lt;P&gt;The outside interface is enabled but I keep getting the nat-xlate-failed message when I ran packet trace using asdm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the trace from putty:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet input inside tcp 10.0.0.1 www 8.8.8.8 www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside control-plane&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq www log disable&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Internal&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.0.0.1/80 to 69.33.71.146/80&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 9822151, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2014 14:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568153#M201924</guid>
      <dc:creator>isabellat</dc:creator>
      <dc:date>2014-12-24T14:39:14Z</dc:date>
    </item>
    <item>
      <title>Hi,I think as per this output</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568154#M201925</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think as per this output , I don't see any issues with the NAT statement.&lt;/P&gt;&lt;P&gt;Are you seeing the Xlate error in Syslogs ? If yes , post some messages or the screenshot of the tracer which you run from the ASDM.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2014 14:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/2568154#M201925</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-12-24T14:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,I think as per this output</title>
      <link>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/3925157#M201926</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;Has this been resolved for you? I am having the same issue and would be curious to see what the resolution was.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2019 19:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-xlate-failed-nat-failed/m-p/3925157#M201926</guid>
      <dc:creator>deca24</dc:creator>
      <dc:date>2019-09-16T19:06:49Z</dc:date>
    </item>
  </channel>
</rss>

