<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012250#M23242</link>
    <description>But I cannot do a port forward for ICMP traffic as ICMP does not have a udp/tcp port.&lt;BR /&gt;So is there a workarround to this please?</description>
    <pubDate>Wed, 15 Jan 2020 23:14:22 GMT</pubDate>
    <dc:creator>nwekechampion</dc:creator>
    <dc:date>2020-01-15T23:14:22Z</dc:date>
    <item>
      <title>ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4010908#M23228</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot seem to ping server in dmz from "OUTSIDE" (Static Nat). However, I can ping Outside from inside (PAT).&lt;/P&gt;&lt;P&gt;Could anyone point me to the right direction please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network INSIDE-OUTSIDE&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network DMZ2-OUTSIDE&lt;BR /&gt;nat (dmz2,outside) dynamic interface&lt;BR /&gt;object network DMZ1-OUTSIDE&lt;BR /&gt;nat (dmz1,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface&lt;BR /&gt;ASAlab2(config)#&lt;BR /&gt;ASAlab2(config)#&lt;BR /&gt;ASAlab2(config)# sh run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: 9AMKNK263EE&lt;BR /&gt;: Hardware: ASAv, 2048 MB RAM, CPU Pentium II 2095 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASAlab2&lt;BR /&gt;enable password $sha512$5000$+Kpz/EysDD1un1b5YiX/MQ==$k3TtQlPYooJmTbkU/HIykA== pbkdf2&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description WAN&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.1.1.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description LAN&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description DMZ1&lt;BR /&gt;nameif dmz1&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;description DMZ2&lt;BR /&gt;nameif dmz2&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network INSIDE-OUTSIDE&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network DMZ1-SERVER&lt;BR /&gt;host 192.168.1.10&lt;BR /&gt;object network OUTSIDE-DMZ1&lt;BR /&gt;host 10.1.1.10&lt;BR /&gt;object network DMZ2-OUTSIDE&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network DMZ1-OUTSIDE&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list OUTISDE-DMZ extended permit ip any host 192.168.1.10&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz1 1500&lt;BR /&gt;mtu dmz2 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;!&lt;BR /&gt;object network INSIDE-OUTSIDE&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network DMZ2-OUTSIDE&lt;BR /&gt;nat (dmz2,outside) dynamic interface&lt;BR /&gt;object network DMZ1-OUTSIDE&lt;BR /&gt;nat (dmz1,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group OUTISDE-DMZ in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.1.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;/P&gt;&lt;P&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;console serial&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:1d55c3acd48ddf7aa7f83d370abfc6ba&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 03:32:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4010908#M23228</guid>
      <dc:creator>nwekechampion</dc:creator>
      <dc:date>2020-01-14T03:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4010934#M23229</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do see access list configured to allow all kind of traffic from outside to dmz server but I &amp;nbsp;do not see any static nat associated with dmz server.Please configure static nat to allow ping from outside to DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;If you have any free IP address in range of outside subnet then use it for static static Nat with DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;lets say :10.1.1.3 is free IP address in outside subnet.(10.1.1.0/24)&lt;/P&gt;&lt;P&gt;object network obj-10.1.1.3&lt;/P&gt;&lt;P&gt;host 10.1.1.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj-&lt;SPAN&gt;192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;host&amp;nbsp;&lt;SPAN&gt;192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nat (DMZ1,OUTSIDE) source static&amp;nbsp;&lt;STRONG&gt;obj-&lt;SPAN&gt;192.168.1.10&amp;nbsp;obj-10.1.1.3.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;The above Nat is applicable&amp;nbsp;only when you have free IP address in outside&amp;nbsp;subnet, but in your&amp;nbsp;case you are are using /30&amp;nbsp;subset&amp;nbsp;where you have&amp;nbsp;only&amp;nbsp;two&amp;nbsp;useable &amp;nbsp;IP&amp;nbsp;address,one is for&amp;nbsp;the firewall and other&amp;nbsp;one is for the&amp;nbsp;Gateway(according to the pasted configuration).&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For UDP/TCP we can use&amp;nbsp;the interface IP&amp;nbsp;address of the firewall for port forwarding but for ICMP we can not&amp;nbsp;use port&amp;nbsp;forwarding since ICMP&amp;nbsp;doesn't work on port (different protocol).&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;We can use the outside interface IP address for one to one static Nat with DMZ server ,however it will &amp;nbsp;break the other Nat.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nat (DMZ1,Oustide) source static obj-192.168.1.10 interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if you have any query and do rate if it is help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guddu&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 04:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4010934#M23229</guid>
      <dc:creator>GudduPrasad83044</dc:creator>
      <dc:date>2020-01-14T04:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4010936#M23230</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is not going to ping with your NAT configuration. You have already done NAT of many to one from Inside Subnet to Outside which will allow your Inside to reach outside. What kind of service running on your DMZ? Option for you is either to arrange unique Public IP or configure port forwarding on the Outside Interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For Example, your server in DMZ is Web server running on port 443 and you want to access the webpage from outside then confige would look like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;object network DMZ1-OUTSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (dmz1,outside) static interface service tcp 443 443&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Further, you need to allow traffic on tcp port 443 in above example&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 05:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4010936#M23230</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-14T05:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012214#M23232</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/985756"&gt;@GudduPrasad83044&lt;/a&gt; .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have adjusted that to a slash 24 subnet. Still not working.&lt;/P&gt;&lt;P&gt;So if I am to understand you correctly, I cannot have PAT and static NAT on the same interface (zone)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 22:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012214#M23232</guid>
      <dc:creator>nwekechampion</dc:creator>
      <dc:date>2020-01-15T22:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012220#M23234</link>
      <description>&lt;P&gt;You cannot have it. You can configure port forwarding in that case if you want to utilize same IP for PAT and NAT ( for incoming traffic to server)&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 22:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012220#M23234</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-15T22:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012241#M23236</link>
      <description>&lt;P&gt;just to add what &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284898"&gt;@Muhammad Awais Khan&lt;/a&gt;&amp;nbsp; mentioned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network DMZ1-OUTSIDE&lt;BR /&gt;nat (dmz1,outside) static interface service tcp 443 443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any object DMZ1-OUTSIDE eq 443&lt;/P&gt;
&lt;P&gt;access-group OUTSIDE_IN in interface outside.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 23:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012241#M23236</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-15T23:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012248#M23238</link>
      <description>Hi Muhammad,&lt;BR /&gt;&lt;BR /&gt;I was just trying to configure PAt and and static NAt in the same zone.&lt;BR /&gt;So I want to be able to ping the internet from DMZ -server, while allowing connections (ICMP traffic) to the DMZ-Server from the internet.&lt;BR /&gt;</description>
      <pubDate>Wed, 15 Jan 2020 23:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012248#M23238</guid>
      <dc:creator>nwekechampion</dc:creator>
      <dc:date>2020-01-15T23:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012250#M23242</link>
      <description>But I cannot do a port forward for ICMP traffic as ICMP does not have a udp/tcp port.&lt;BR /&gt;So is there a workarround to this please?</description>
      <pubDate>Wed, 15 Jan 2020 23:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012250#M23242</guid>
      <dc:creator>nwekechampion</dc:creator>
      <dc:date>2020-01-15T23:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012384#M23247</link>
      <description>&lt;P&gt;For icmp you can configure access list. here is the example.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside-in exten permit icmp any host 192.168.10.1 eq echo.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside-in in outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 07:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4012384#M23247</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-01-16T07:15:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4014180#M23249</link>
      <description>Hi Sheraz,&lt;BR /&gt;&lt;BR /&gt;Access-list is fine.&lt;BR /&gt;&lt;BR /&gt;I am just trying to test connectivity to my webserver using static nat.&lt;BR /&gt;I just need diagnostic test using icmp.&lt;BR /&gt;However it does not work.&lt;BR /&gt;So, does it mean I cannot have PAT and static on the same interface/zone?&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;</description>
      <pubDate>Sun, 19 Jan 2020 15:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4014180#M23249</guid>
      <dc:creator>nwekechampion</dc:creator>
      <dc:date>2020-01-19T15:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4014181#M23251</link>
      <description>Hi Muhammad,&lt;BR /&gt;&lt;BR /&gt;So If I am to understand you correctly, I can only have either PAT or static on ASA zone/interface, I cannot have both simultaneously?&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Sun, 19 Jan 2020 15:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4014181#M23251</guid>
      <dc:creator>nwekechampion</dc:creator>
      <dc:date>2020-01-19T15:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue: Cannot ping Server in DMZ - Static Nat not working.</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4014186#M23252</link>
      <description>&lt;P&gt;For this scenario, as per my understanding it will not work as you are doing static NAT of outside Interface IP. If you have any additional IP available other than interface IP then you can use PAT and static NAT for your server together.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tested some scenarios with PAT and port forwarding on the ASA's outside for internal servers which worked fine for me.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2020 15:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue-cannot-ping-server-in-dmz-static-nat-not-working/m-p/4014186#M23252</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-19T15:49:51Z</dc:date>
    </item>
  </channel>
</rss>

