<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi VibhorThank you very much in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530885#M234424</link>
    <description>&lt;P&gt;Hi Vibhor&lt;/P&gt;&lt;P&gt;Thank you very much for the help. It was the same issue mentioned the link. Once we rebooted the ISP router everything started working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again .:) :):)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Oct 2014 04:28:57 GMT</pubDate>
    <dc:creator>Ejaz Ahmed</dc:creator>
    <dc:date>2014-10-16T04:28:57Z</dc:date>
    <item>
      <title>Static NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530873#M234402</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;Please help me on this. I have attached my network diagram with this post.&lt;BR /&gt;My firewall is cisco ASA 5510 running with software version 8.4. I have configured static NAT for three servers (in diagram, server 1,2 and 3). The issue is, the static NAT is only working with the first server. No traffics are&amp;nbsp; going in and out from other two server (Server 2 and 3). All servers are in DMZ.&lt;/P&gt;&lt;P&gt;When I remove the static NAT for the server 2 and 3, all the traffic is going from the server with WAN IP of the firewall, that means the dynamic NAT is working. I have attached the configuration file also.&lt;/P&gt;&lt;P&gt;(NOTE: NAT is working for the Server 72.16.34.1)&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Ejaz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530873#M234402</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2019-03-12T04:52:45Z</dc:date>
    </item>
    <item>
      <title>Hi Ejaz,Can you please verify</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530874#M234403</link>
      <description>&lt;P&gt;Hi Ejaz,&lt;/P&gt;&lt;P&gt;Can you please verify the NAT statements for only the servers which are not wokring. It is very difficult to search it through the configuration which you have provided.&lt;/P&gt;&lt;P&gt;Also , you can send the Packet Tracer outputs form the outside to DMZZ for the Servers which are not working.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 04:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530874#M234403</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-08T04:53:13Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor, I have attached</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530875#M234404</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have attached the NAT configuration of one the server that having issue. Also please see that pact tracer output :&lt;/P&gt;&lt;P&gt;ASA5510# packet-tracer input Outside tcp 4.2.2.2 12345 w.w.w.w 80 detaile$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network 172.16.34.3_Rev_NAT&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) static 23.30.88.139 dns&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate w.w.w.w/80 to 172.16.34.3/80&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_DMZ_ACCESS_IN_ACL in interface Outside&lt;BR /&gt;access-list OUTSIDE_DMZ_ACCESS_IN_ACL extended permit tcp any object UCALLTEL-DMZ-VOIPSRV-02-172.16.34.3 eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac8f08c0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xa9863780, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.16.34.3, mask=255.255.255.255, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac03ccb0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=152903, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xaf133240, priority=70, domain=inspect-http, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10024, user_data=0xaf132770, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xaca29438, priority=50, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=33660, user_data=0xaf58bd60, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xad2d6908, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=65250, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network 172.16.34.3_Rev_NAT&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) static w.w.w.w dns&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xaeb79b70, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xafa57f48, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.16.34.3, mask=255.255.255.255, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=DMZ&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xaf119ad8, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=41909, user_data=0xaf144310, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=DMZ&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac0ef7b8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=64267, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xaf118a48, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=150381, user_data=0xaf144310, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 609401, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 05:30:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530875#M234404</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-10-08T05:30:11Z</dc:date>
    </item>
    <item>
      <title>Hi Ejaz,Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530876#M234405</link>
      <description>&lt;P&gt;Hi Ejaz,&lt;/P&gt;&lt;P&gt;Thank you for the reply. To be sure all the public IP being used for Nat on the ASA device are in the Outside Interface Pool ? Correct ?&lt;/P&gt;&lt;P&gt;If no , add this command:- arp permit-nonconnected&lt;/P&gt;&lt;P&gt;If yes , i think the issue might not be with the ASA device. Are these some new IP addresses and have we used it before ?&lt;/P&gt;&lt;P&gt;I would request you to apply the captures on the ASA device interfaces and see which device is not replying:-&lt;/P&gt;&lt;P&gt;capture capout interface Outside match ip host &amp;lt;Public IP of server which is not working&amp;gt; any&lt;/P&gt;&lt;P&gt;capture capin interface DMZ match ip host &amp;lt;Private IP of server which is not working&amp;gt; any&lt;/P&gt;&lt;P&gt;Send me the captures if required.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 06:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530876#M234405</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-08T06:30:40Z</dc:date>
    </item>
    <item>
      <title>HiThank you for the reply.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530877#M234406</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thank you for the reply.&lt;/P&gt;&lt;P&gt;"outside interface pool"??? I didn't get. Could you please explain this to me??&lt;/P&gt;&lt;P&gt;I am using the public IP addresses&amp;nbsp; in the same IP block provided by ISP.&amp;nbsp; When I configured the public IP in the server and connected it direcly to the ISP router, it was working fine.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 07:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530877#M234406</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-10-08T07:04:32Z</dc:date>
    </item>
    <item>
      <title>Hi Ejaz,For ex:- If you have</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530878#M234407</link>
      <description>&lt;P&gt;Hi Ejaz,&lt;/P&gt;&lt;P&gt;For ex:- If you have the External Interface configured as :-&lt;/P&gt;&lt;P&gt;ip address 1.1.1.1 255.255.255.248&lt;/P&gt;&lt;P&gt;The Natted Ip should be within this range of IP addresses:-&lt;/P&gt;&lt;P&gt;For Ex:- 1.1.1.1 -1.1.1.6.&lt;/P&gt;&lt;P&gt;If not , you would need this command on the ASA device:-&lt;/P&gt;&lt;P&gt;arp permit-nonconnected&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 07:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530878#M234407</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-08T07:04:33Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor,Thank you so much</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530879#M234409</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;Thank you so much for that quick response.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;We are using the IP addresses in the same pool.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Ejaz&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 07:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530879#M234409</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-10-08T07:08:51Z</dc:date>
    </item>
    <item>
      <title>Hi Ejaz,Then , I think you</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530880#M234412</link>
      <description>&lt;P&gt;Hi Ejaz,&lt;/P&gt;&lt;P&gt;Then , I think you should proceed with the captures on the ASA device interfaces.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 07:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530880#M234412</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-08T07:11:42Z</dc:date>
    </item>
    <item>
      <title>Hi VibhorI have attached the</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530881#M234416</link>
      <description>&lt;P&gt;Hi Vibhor&lt;/P&gt;&lt;P&gt;I have attached the capture result with the post.&lt;/P&gt;&lt;P&gt;I tried to ping from the server to the IP 8.8.8.8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 08:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530881#M234416</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-10-08T08:14:38Z</dc:date>
    </item>
    <item>
      <title>Hi Ejaz,I think as you can</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530882#M234418</link>
      <description>&lt;P&gt;Hi Ejaz,&lt;/P&gt;&lt;P&gt;I think as you can see in the captures , we only see Uni-directional traffic through the ASA device and no reply from the Outside server.&lt;/P&gt;&lt;P&gt;This can mean that the IP Addresses might not be working.&lt;/P&gt;&lt;P&gt;Is this ASA device in production at this moment ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 08:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530882#M234418</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-08T08:22:36Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor, Yes, this ASA is</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530883#M234420</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, this ASA is in production. I have assigned the public IP to the server directly and connected the server to the ISP router, it was working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 08:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530883#M234420</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-10-08T08:27:08Z</dc:date>
    </item>
    <item>
      <title>Hi Ejaz,Would you be able to</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530884#M234422</link>
      <description>&lt;P&gt;Hi Ejaz,&lt;/P&gt;&lt;P&gt;Would you be able to try this workaround:-&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/blog/149276/asapix-proxy-arp-vs-gratuitous-arp&lt;/P&gt;&lt;P&gt;I think the issue is with the IP addresses provided by the ISP.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 08:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530884#M234422</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-08T08:29:45Z</dc:date>
    </item>
    <item>
      <title>Hi VibhorThank you very much</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530885#M234424</link>
      <description>&lt;P&gt;Hi Vibhor&lt;/P&gt;&lt;P&gt;Thank you very much for the help. It was the same issue mentioned the link. Once we rebooted the ISP router everything started working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again .:) :):)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 04:28:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-issue/m-p/2530885#M234424</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-10-16T04:28:57Z</dc:date>
    </item>
  </channel>
</rss>

