<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic what is wrong with this NAT rule? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554419#M236853</link>
    <description>&lt;P&gt;I have a NAT rule that seems to be failing on my ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The host is on a DMZ interface. Let's call it ACME-DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the nat rule looks like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj-172.31.150.41&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 172.31.150.41&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (ACME-DMZ,outside) static 166.191.102.41&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the access-list on the ACME-DMZ interface is permit ip any any (for troubleshooting)&lt;/P&gt;&lt;P&gt;the access-list on the outside interface permits tcp 443 to the "real" address 172.31.150.41&lt;/P&gt;&lt;P&gt;security level on ACME-DMZ interface is 40&lt;/P&gt;&lt;P&gt;security level on outside is 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I do a packet trace in ASDM it gets through the ACLs and routes, but fails on the NAT, saying "packet dropped."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It doesn't say anything else. What is the issue here?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:25:18 GMT</pubDate>
    <dc:creator>Colin Higgins</dc:creator>
    <dc:date>2019-03-12T04:25:18Z</dc:date>
    <item>
      <title>what is wrong with this NAT rule?</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554419#M236853</link>
      <description>&lt;P&gt;I have a NAT rule that seems to be failing on my ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The host is on a DMZ interface. Let's call it ACME-DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the nat rule looks like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj-172.31.150.41&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 172.31.150.41&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (ACME-DMZ,outside) static 166.191.102.41&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the access-list on the ACME-DMZ interface is permit ip any any (for troubleshooting)&lt;/P&gt;&lt;P&gt;the access-list on the outside interface permits tcp 443 to the "real" address 172.31.150.41&lt;/P&gt;&lt;P&gt;security level on ACME-DMZ interface is 40&lt;/P&gt;&lt;P&gt;security level on outside is 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I do a packet trace in ASDM it gets through the ACLs and routes, but fails on the NAT, saying "packet dropped."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It doesn't say anything else. What is the issue here?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554419#M236853</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2019-03-12T04:25:18Z</dc:date>
    </item>
    <item>
      <title>more info: the error is an</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554420#M236870</link>
      <description>&lt;P&gt;more info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the error is an "rpf-check" error&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 22:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554420#M236870</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2014-07-03T22:24:49Z</dc:date>
    </item>
    <item>
      <title>Hi Colin, What is the exact</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554421#M236871</link>
      <description>&lt;P&gt;Hi Colin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the exact statement you have given in the packet tracer statement.... you packet tracer command should be like this... Normally if you misconfigure your Packet tracer also gives wrong result.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You NAT statement should be okay....&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 1.1.1.1 2000 166.191.102.41 443 detailed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also there is a bug in ASA 9.1 x versions for showing wrong packet tracer results...&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 06:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554421#M236871</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-04T06:41:48Z</dc:date>
    </item>
    <item>
      <title>OK, the trace result is below</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554422#M236872</link>
      <description>&lt;P&gt;OK, the trace result is below. Basically, what is happening is that I have two hosts on the DMZ (172.31.150.40 &amp;amp; 41). Both are up and reachable from the firewall and both are in the same access-list (outside-in). .40 answers to pings and I can connect to its resources. The 172.31.150.41 server does not respond at all, and it looks like a NAT failure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the error in the log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jul 04 2014 01:06:33: %ASA-4-313004: Denied ICMP type=0, from laddr 172.31.150.41 on interface ACME-DMZ to 73.50.84.166: no matching session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and here is the packet-trace&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 1.1.1.1 2000 166.191.102.41 443$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2dda45d0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2582579461, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-172.31.150.41&lt;BR /&gt;&amp;nbsp;nat (ACME-DMZ,outside) static 166.191.102.41&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface ACME-DMZ&lt;BR /&gt;Untranslate 166.191.102.41/443 to 172.31.150.41/443&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside-in in interface outside&lt;BR /&gt;access-list outside-in extended permit tcp any host 172.31.150.41 object-group Lync-Edge-Outside log debugging&lt;BR /&gt;object-group service Lync-Edge-Outside tcp&lt;BR /&gt;&amp;nbsp;description: Services for Lync Edge from outside&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq 5061&lt;BR /&gt;&amp;nbsp;port-object range 50000 59999&lt;BR /&gt;&amp;nbsp;port-object eq 3478&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2fa325c0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4, user_data=0x7fff270d3b00, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.31.150.41, mask=255.255.255.255, port=443, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2dda9610, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=30557179, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2ee9c110, priority=50, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2026601, user_data=0x7fff2e508830, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2ea757f0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3667292, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-172.31.150.41&lt;BR /&gt;&amp;nbsp;nat (ACME-DMZ,outside) static 166.191.102.41&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff2fcd8dc0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=114, user_data=0x7fff2fa0f9a0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.31.150.41, mask=255.255.255.255, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=ISTHA-DMZ&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2fb26510, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=145553, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=ISTHA-DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 32743408, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ISTHA-DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 14:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554422#M236872</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2014-07-04T14:02:58Z</dc:date>
    </item>
    <item>
      <title>a little more info: there is</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554423#M236873</link>
      <description>&lt;P&gt;a little more info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there is another firewall on that subnet. could the host be replying out that firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the host's default gateway is this ASA we are working with here.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 14:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554423#M236873</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2014-07-04T14:08:13Z</dc:date>
    </item>
    <item>
      <title>is this public ip 166.191.102</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554424#M236877</link>
      <description>&lt;P&gt;is this public ip 166.191.102.41 is dedicated for the server 172.31.150.41? If so then you should not have any issue with your NAT statement..... does firewall have a proper route to the server..... the other firewall firewall you have mentioned here right.... if that firewall is gateway of the host then you should have a proper routing and access rules allowed in that firewall......&lt;/P&gt;&lt;P&gt;&amp;nbsp;Internet ---&amp;gt; (Out) &amp;lt;&amp;gt;ASA &amp;lt;&amp;gt;(DMZ)---------------&amp;gt;ASA(LAN)--&amp;gt;Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the above scenario you are doing NAT on the Internet ASA FW and server is in DMZ Zone where it has an another firewall inside the DMZ Zone.... You have already done NAT and Access Rules allowed in internet firewall..... in iNternet firewall you should have the static route to reach firewall....&lt;/P&gt;&lt;P&gt;say for eg: route ACME-DMZ 172.31.150.41 255.255.255.255 &amp;lt; DMZ ASA IP Address&amp;gt;&lt;/P&gt;&lt;P&gt;and in ASA DMZ you should have the routing pointed to internet ASA....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 15:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554424#M236877</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-04T15:08:49Z</dc:date>
    </item>
    <item>
      <title>OK, I have some more info: If</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554425#M236878</link>
      <description>&lt;P&gt;OK, I have some more info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I ping 166.191.102.40 from the outside I get a reply&lt;/P&gt;&lt;P&gt;if I ping 166.191.102.41 I see the traffic hitting the firewall and then dying on the trace with a "no matching session" error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I ping from 166.191.102.41 to the Internet through the firewall, I see the icmp traffic pass through the firewall to the outside, but nothing comes back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I ping from 166.191.102.41 to the internal network it works both ways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So traffic seems to be "one way" to and from the host. I don't know why.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2014 14:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554425#M236878</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2014-07-07T14:12:25Z</dc:date>
    </item>
    <item>
      <title>do you have inspect icmp in</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554426#M236881</link>
      <description>&lt;P&gt;do you have inspect icmp in policy-map??? Also do you have the icmp allowed for that specific host??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2014 06:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-nat-rule/m-p/2554426#M236881</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-08T06:46:00Z</dc:date>
    </item>
  </channel>
</rss>

