<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sorry I was a little fast in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502270#M234791</link>
    <description>&lt;P&gt;Sorry I was a little fast with my copy/paste. Could you please re-run the packet tracer.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ tcp 172.16.34.2 12345&amp;nbsp;4.2.2.2 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Tue, 23 Sep 2014 10:03:28 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-09-23T10:03:28Z</dc:date>
    <item>
      <title>NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502258#M234775</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of my office have Cisco ASA 5510 with ios 8.4(5). Everything is configured and working fine except the static NAT. I have a block of public IP, which I used to configure static NAT.&amp;nbsp; The internal server which is configured with static NAT is not getting internet or anything. When I removed the static NAT, the internet is getting (through WAN interface IP). The server is placed in the DMZ. I have allowed everything to the server but it is not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;EJAZ&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502258#M234775</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2019-03-12T04:46:15Z</dc:date>
    </item>
    <item>
      <title>Would help to see your ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502259#M234776</link>
      <description>&lt;P&gt;Would help to see your ASA configuration to identify where the problem is.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Static NAT can be configured as follows:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;BR /&gt;&amp;nbsp; host 10.10.10.1&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static 11.11.11.1 tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;BR /&gt;&amp;nbsp; host 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-NAT&lt;BR /&gt;&amp;nbsp; host 11.11.11.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service WEB&lt;BR /&gt;&amp;nbsp;service tcp destination eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER SERVER-NAT service WEB WEB&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 17 Sep 2014 21:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502259#M234776</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-17T21:21:27Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502260#M234777</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;Thank you for the reply. Please see attached my conifug file.&lt;/P&gt;&lt;P&gt;Please note that I have three servers which configured with static NAT, that are: 172.16.34.1, 172.16.34.2 and 172.16.34.3&lt;/P&gt;&lt;P&gt;Issue with 172.16.34.2 and 172.16.34.3 (Static NAT is not working for these server)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2014 07:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502260#M234777</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-18T07:10:11Z</dc:date>
    </item>
    <item>
      <title>Could you please run the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502261#M234780</link>
      <description>&lt;P&gt;Could you please run the following packet tracer and post the output here&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 4.2.2.2 12345 172.16.34.2 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This should give us an indication of what is causing the packet to drop.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2014 07:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502261#M234780</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-18T07:10:12Z</dc:date>
    </item>
    <item>
      <title>Hi Marius, Please see below</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502262#M234781</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see below the output:&lt;/P&gt;&lt;P&gt;ASA5510# packet-tracer input outside tcp 4.2.2.2 12345 172.16.34.2 80 detail ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; xml &amp;nbsp;Output in xml format&lt;BR /&gt;&amp;nbsp; &amp;lt;cr&amp;gt;&lt;BR /&gt;ASA5510# packet-tracer input outside tcp 4.2.2.2 12345 172.16.34.2 80 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xac0381c0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=16053, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 172.16.34.0 &amp;nbsp; &amp;nbsp; 255.255.255.0 &amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_DMZ_ACCESS_IN_ACL in interface Outside&lt;BR /&gt;access-list OUTSIDE_DMZ_ACCESS_IN_ACL extended permit tcp any object UCALLTEL-DMZ-A2BILLING01-172.16.34.2 eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xac69f910, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=0, user_data=0xa9862c00, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=172.16.34.2, mask=255.255.255.255, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xac03ccb0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=873, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xaf133240, priority=70, domain=inspect-http, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=289, user_data=0xaf132770, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xaca29438, priority=50, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=393, user_data=0xaf58bd60, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xad2d6908, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=527, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network NAT-INET-UCALLTEL-A2BILLING01-WWW&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) static 23.30.88.140 service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xac4e6ba0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=1, user_data=0xac4e5d88, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=172.16.34.2, mask=255.255.255.255, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=DMZ&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2014 13:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502262#M234781</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-18T13:43:57Z</dc:date>
    </item>
    <item>
      <title>Could you please run the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502263#M234782</link>
      <description>&lt;P&gt;Could you please run the packet tracer again, but this time exchange the 172.16.34.2 address with the translated (public) IP.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2014 06:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502263#M234782</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-19T06:52:57Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Please see the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502264#M234783</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;Please see the below output, I have changed the IP with Nated Public IP:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5510# packet-tracer input outside tcp 4.2.2.2 12345 x.x.x.x 80 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network NAT-INET-UCALLTEL-A2BILLING01-WWW&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) static x.x.x.x service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate x.x.x.x/80 to 172.16.34.2/80&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_DMZ_ACCESS_IN_ACL in interface Outside&lt;BR /&gt;access-list OUTSIDE_DMZ_ACCESS_IN_ACL extended permit tcp any object UCALLTEL-DMZ-A2BILLING01-172.16.34.2 eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac69f910, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0xa9862c00, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.16.34.2, mask=255.255.255.255, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac03ccb0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=7296, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xaf133240, priority=70, domain=inspect-http, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=358, user_data=0xaf132770, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xaca29438, priority=50, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=701, user_data=0xaf58bd60, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xad2d6908, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2432, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network NAT-INET-UCALLTEL-A2BILLING01-WWW&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) static x.x.x.x service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xac4e6ba0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xac4e5d88, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.16.34.2, mask=255.255.255.255, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=DMZ&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xaf119ad8, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=987, user_data=0xaf144310, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=DMZ&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac0ef7b8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=812, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xaf118a48, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4656, user_data=0xaf144310, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 31936, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2014 08:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502264#M234783</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-19T08:08:41Z</dc:date>
    </item>
    <item>
      <title>As per the packet tracer the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502265#M234784</link>
      <description>&lt;P&gt;As per the packet tracer the traffic flow is allowed through the ASA.&amp;nbsp; Have you made sure that the Server is correctly configured? and if that traffic is being switched / routed corrected from the ASA to the server?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2014 09:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502265#M234784</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-19T09:18:20Z</dc:date>
    </item>
    <item>
      <title>Hi Marius, Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502266#M234785</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply. As of now our devoplment team is working with server and it is not connected to the network. Once it is connected I will let you know the status.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also can you give advise on the below issue:&lt;/P&gt;&lt;P&gt;In the same firewall configuration like I earlier mentioned, there is no NAT issue with the server 172.16.34.1. Only certain ports are forwarded to the server. I can connect the SIP with NATed public IP to this server and everything working fine for inbound traffic. But when a connection is going from the server (ie outbound) the server is using firewall's WAN interface IP instead of its NAT IP. Why it is going like that? How can we change that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 06:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502266#M234785</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-23T06:41:48Z</dc:date>
    </item>
    <item>
      <title>Hi, You say that you have</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502267#M234786</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You say that you have forwarded the required ports to the server so that inbound connections from the external networks can reach the server but that the problem is when the server opens outbound connections to the external networks? It uses a different public IP address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main question here is if any other device uses the public IP address that you have used to forward the ports (Static PAT)? If the public IP address used in the Static PAT configurations for the server is only used for that specific server then you should really change the Static PAT to Static NAT which would in turn mean that the server would use that public IP address for ALL outbound connections. At the same time it would also allow connections on any port inbound for the server (What is allowed is naturally determined by your interface ACL but what I mean is that you would not need any additional NAT configurations to allow connections to some port, only the ACL rule)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 06:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502267#M234786</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-09-23T06:51:16Z</dc:date>
    </item>
    <item>
      <title>When you say going outbound</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502268#M234787</link>
      <description>&lt;P&gt;When you say going outbound do you mean internet traffic?&lt;/P&gt;&lt;P&gt;You could run the packet-tracer again to see which NAT it is matching ( my assumtion is that it is matching the dynamic NAT statement you have configured).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 172.16.34.2 12345&amp;nbsp;4.2.2.2 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I am thinking that the NAT statement is trying to match on the source port, and since the PC is sending with a random high port number it wont match and will therefore default to the dynamic NAT statement.&lt;/P&gt;&lt;P&gt;Also could you post your configuration again...I do not see it where you posted it earlier.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 07:28:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502268#M234787</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-23T07:28:44Z</dc:date>
    </item>
    <item>
      <title>Hi Please see below output:</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502269#M234789</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see below output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5510# packet-tracer input outside tcp 172.16.34.2 12345 4.2.2.2 80 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 172.16.34.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (rpf-violated) Reverse-path verify failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I have attached the configuration file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 10:03:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502269#M234789</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-23T10:03:27Z</dc:date>
    </item>
    <item>
      <title>Sorry I was a little fast</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502270#M234791</link>
      <description>&lt;P&gt;Sorry I was a little fast with my copy/paste. Could you please re-run the packet tracer.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ tcp 172.16.34.2 12345&amp;nbsp;4.2.2.2 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 10:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502270#M234791</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-23T10:03:28Z</dc:date>
    </item>
    <item>
      <title>Hi Jouni,Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502271#M234793</link>
      <description>&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Thank you for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NATed IP is only using by the server.&lt;/P&gt;&lt;P&gt;Let me know for any further queries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 10:15:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502271#M234793</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-23T10:15:53Z</dc:date>
    </item>
    <item>
      <title>Hi Marius, Please see the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502272#M234794</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see the below output;&lt;/P&gt;&lt;P&gt;ASA5510# packet-tracer input DMZ tcp 172.16.34.2 12345 4.2.2.2 80 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_ACCESS_IN_ACL in interface DMZ&lt;BR /&gt;access-list DMZ_ACCESS_IN_ACL extended permit tcp object UCALLTEL-DMZ-172.16.34.0 any eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac8f43a8, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=70, user_data=0xa9861c80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=172.16.34.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac0ef7b8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3138, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xaf10e9e0, priority=70, domain=inspect-http, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=71, user_data=0xaf132770, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xaee1b6b8, priority=50, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=779, user_data=0xaf58bd60, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network UCALLTEL-DMZ-172.16.34.0&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 172.16.34.2/12345 to x.30.x.x/12345&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac498108, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=43994, user_data=0xac497728, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=172.16.34.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xaf118a48, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14402, user_data=0xaf144310, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac03ccb0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=17760, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xaf119ad8, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3397, user_data=0xaf144310, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=DMZ&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 139995, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 10:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502272#M234794</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-23T10:30:39Z</dc:date>
    </item>
    <item>
      <title>Hi, In your case the format</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502273#M234797</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your case the format for configuring Static NAT for the server would be&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network &amp;lt;object name&amp;gt;&lt;BR /&gt;&amp;nbsp;host &amp;lt;server local ip&amp;gt;&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) static &amp;lt;public ip address&amp;gt; dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This would bind the local IP address to the public IP address configured on the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command. This would mean that outbound connections would also use this public IP address. If you had a similiar Static PAT configuration already then you would not really need that UNLESS you are changing the mapped/local port in the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But configuring the Static NAT would already mean that it would override the Dynamic PAT for outgoing connections from this server. Naturally there is a small chance depending on your current complete NAT configuration that even this Static NAT might be overridden but I doubt it. If the above &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; is for the DMZ server in question then there should be no problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 10:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502273#M234797</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-09-23T10:30:40Z</dc:date>
    </item>
    <item>
      <title>Hi Jouni, Great help!!!!! It</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502274#M234798</link>
      <description>&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Great help!!!!! It worked.&lt;/P&gt;&lt;P&gt;Now the server connections are going with NATed Public IP.&lt;/P&gt;&lt;P&gt;Thank you so much for your help.&lt;/P&gt;&lt;P&gt;I have one more issue that need to be resolved. Some other teams are currently working on the server, once they have done with server I need to check on that.&lt;/P&gt;&lt;P&gt;Marius also helping me on that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 12:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502274#M234798</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-23T12:34:23Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,From the output it</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502275#M234800</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;From the output it is showing that the connection is going outside with firewall's interface IP. I have configured the command which is provided byJouni Forss.&lt;/P&gt;&lt;P&gt;Now the outbound connection from the server also going with the NATed public IP. Thank you so much for the help. I really appreciate for the help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 12:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502275#M234800</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-23T12:44:22Z</dc:date>
    </item>
    <item>
      <title>Hi Jouni,Really appreciate</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502276#M234801</link>
      <description>&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Really appreciate for the replies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can check the configuration file I have attached&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2014 07:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502276#M234801</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-09-24T07:31:54Z</dc:date>
    </item>
    <item>
      <title>Hi Jouni,We still have the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502277#M234802</link>
      <description>&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;We still have the issue &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have configured three static NAT in the firewall, only one is working correctly.&lt;/P&gt;&lt;P&gt;When I remove the static NAT of other two, the connections from the server is going with WAN IP and everything working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the static NAT, no traffics are going outside from the two servers(having issue).&lt;/P&gt;&lt;P&gt;Please help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ejaz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 03:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2502277#M234802</guid>
      <dc:creator>Ejaz Ahmed</dc:creator>
      <dc:date>2014-10-08T03:04:50Z</dc:date>
    </item>
  </channel>
</rss>

