<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Nkarthikeyan, The in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553525#M236954</link>
    <description>&lt;P&gt;Hello Nkarthikeyan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is not resolved at all...Actually by upgrading to the version 9.2 it got worse...I thing is something to do with the configuration...I posted some results using the packet tracer as I was advised and I saw some weird logs.&lt;/P&gt;</description>
    <pubDate>Mon, 14 Jul 2014 06:48:20 GMT</pubDate>
    <dc:creator>apapakons</dc:creator>
    <dc:date>2014-07-14T06:48:20Z</dc:date>
    <item>
      <title>NAT , ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553505#M236897</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip: 10.7.128.172&lt;/P&gt;&lt;P&gt;-DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;Ironport&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---------&amp;nbsp;&amp;nbsp; ASA&lt;/P&gt;&lt;P&gt;10.2.129.95&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Exchange Server&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.2.128.43&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to migrate from ASA 5520 (version 8.4.2) to ASA 5515-X (version 9.1.3). The ASA is configured with the following interfaces: Inside, Outside and DMZ. In the inside zone I have the exchange server and in the DMZ Zone I have cisco Ironport which relays the smtp packets to the internal exchange server.&lt;/P&gt;&lt;P&gt;With 5520 I used the following commands and Nat worked perfectly:&lt;/P&gt;&lt;P&gt;object CultexMail-1&lt;/P&gt;&lt;P&gt;host 10.2.128.43&lt;/P&gt;&lt;P&gt;nat (internal,outside) static 10.7.128.172 service tcp pop3 pop3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object CultexMail-2&lt;/P&gt;&lt;P&gt;host 10.2.128.43&lt;BR /&gt;&amp;nbsp;nat (linternal,outside) static 10.7.128.172 service tcp www www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object ironport&lt;/P&gt;&lt;P&gt;host 10.2.129.95&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static 10.7.128.172 service tcp smtp smtp&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;e.t.c&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After replacing the firewall with the new one I could receive emails&amp;nbsp; but I could not access the web interface&amp;nbsp; of exchange from outside&amp;nbsp; and I could not send outgoing emails.&lt;/P&gt;&lt;P&gt;After adding the following commands I was able to access the web interface of my exchange but no luck with sending outgoing emails:&lt;/P&gt;&lt;P&gt;object ironport-test&lt;/P&gt;&lt;P&gt;host 10.2.129.95&lt;/P&gt;&lt;P&gt;nat (dmz,outside) dynamic&amp;nbsp; 10.7.128.172&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object cultexmail-test&lt;/P&gt;&lt;P&gt;host 10.2.128.43&lt;/P&gt;&lt;P&gt;nat (inside, outside) dynamic 10.7.128.172&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any idea for this implementation how Nat rules should be (for Cisco ASA version 9.1)? Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553505#M236897</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2019-03-12T04:24:58Z</dc:date>
    </item>
    <item>
      <title>I would first suggest that</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553506#M236934</link>
      <description>&lt;P&gt;I would first suggest that you change your NAT rules from dynamic to static, as you only have one IP.&amp;nbsp; Also you will need to specify ports that you are translating otherwise you will be NATing all ports to the one server and no other PC on the network will be able to reach the internet.&lt;/P&gt;&lt;P&gt;object cultexmail-test&lt;BR /&gt;host 10.2.128.43&lt;BR /&gt;nat (inside, outside) static 10.7.128.172 service tcp http http&lt;/P&gt;&lt;P&gt;change this first, and then test.&amp;nbsp; Report back the results please.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2014 19:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553506#M236934</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-02T19:34:41Z</dc:date>
    </item>
    <item>
      <title>Also this document may shed</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553507#M236936</link>
      <description>&lt;P&gt;Also this document may shed some light&amp;nbsp;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Yadhu&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 04:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553507#M236936</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2014-07-03T04:32:13Z</dc:date>
    </item>
    <item>
      <title>Hi, Do you see any logs for</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553508#M236937</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see any logs for NAT removal or some error messages related to NAT?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because there is a bug which might be related to this issue.&lt;/P&gt;&lt;P&gt;CSCun95075 - ASA drops packet due to nat-no-xlate-to-pat-pool after removing NAT rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;B&gt;Symptom:&lt;/B&gt;&lt;BR /&gt;Once a twice NAT rule with a service translation is added, other traffic on the interface may also be dropped with a reason of nat-no-xlate-to-pat-pool. This is expected behavior and more details can be found here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_firewall_config/access_fwaaa.html#wp1331733" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_firewall_config/access_fwaaa.html#wp1331733&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;However, if the NAT rule references an object-group and that object-group is changed while the NAT rule is still configured, traffic may still be dropped even after removing the NAT rule.&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Conditions:&lt;/B&gt;&lt;BR /&gt;All of the following conditions must be matched to see this issue:&lt;BR /&gt;&lt;BR /&gt;1) The ASA is configured with a twice NAT rule that uses a service translation&lt;BR /&gt;2) The object-group referenced in the NAT rule is edited (i.e. a new network-object is added to it) while the NAT rule is still configured&lt;BR /&gt;3) The NAT rule is removed from the configuration&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Workaround:&lt;/B&gt;&lt;BR /&gt;Reloading the ASA after the offending NAT rule is removed will resolve the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bug Fixed in release : 9.1.5(1) or 9.1.2(100)&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 05:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553508#M236937</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-03T05:12:02Z</dc:date>
    </item>
    <item>
      <title>Hello MAriusGurrerud</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553509#M236938</link>
      <description>&lt;P&gt;Hello MAriusGurrerud,&lt;/P&gt;&lt;P&gt;Initially, as you suggested, I used the static NAT rules with my new firewall 5515. The same rules I have now at my cisco 5520 and the mail servers work right:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (outside1,lan_Servers) source static syzefxis_ranges syzefxis_ranges destination static CultMAIL CultMAIL&amp;nbsp;&amp;nbsp;&amp;nbsp; // &lt;STRONG&gt;exempt wan mail traffic from use translation - because branches use internal dns server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;// port forwarding&amp;nbsp; incoming&amp;nbsp; smtp traffic to ironport&amp;nbsp; and the other protocols (http,https,imap) to internal exchange&lt;/STRONG&gt; server.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp pop3 pop3&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp www www&lt;BR /&gt;&amp;nbsp;nat (dmz_webservers,outside1) static 10.7.128.172 service tcp smtp smtp&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp imap4 imap4&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp https https&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp 135 135&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The result with asa 5515 version 9.1.3 was tha I could get incoming mail but nothing else. I found out an article at web "http://tsbraindump.blogspot.gr/2013/04/port-address-translation-and-nat-in.html" that proposed&amp;nbsp; (as weird it seems to be - with ASA 9.1) to create dynamic NAT rule for outgoing mail traffic. Then I added to the above configuration the rule:&lt;/P&gt;&lt;P&gt;object cultexmail-test&lt;/P&gt;&lt;P&gt;host 10.2.128.43&lt;/P&gt;&lt;P&gt;nat (inside, outside) dynamic 10.7.128.172&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After the addition of the above command I could access&amp;nbsp; the exchange server&amp;nbsp; webpage but still cannot send mails from my internal exchange to outside (for example from my mail server to yahoo mail).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 07:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553509#M236938</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-03T07:43:34Z</dc:date>
    </item>
    <item>
      <title>Dear Karthik, First of all</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553510#M236939</link>
      <description>&lt;P&gt;Dear Karthik,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First of all thank you for your help. In my new firewall initially I had those rules:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (outside1,lan_Servers) source static syzefxis_ranges syzefxis_ranges destination static CultMAIL CultMAIL&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp pop3 pop3&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp www www&lt;BR /&gt;&amp;nbsp;nat (dmz_webservers,outside1) static 10.7.128.172 service tcp smtp smtp&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp imap4 imap4&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp https https&lt;BR /&gt;&amp;nbsp;nat (lan_Servers,outside1) static 10.7.128.172 service tcp 135 135&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I copied them from my old 5520 ASA firewall (version 8.4.2) whith my network objects. From my configuratiion do you think that I may have problem with this bug?&amp;nbsp; I used asa real time logging at the migration time but did not see any weird logs about nat and I would like to add that with the command "sh nat detail" I could see "counts" of "untranslated_hits" to be increasing&amp;nbsp; for the right rules. This is correct as I have NAt rules of type "NAT (inside,outside)" and I had incoming traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 08:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553510#M236939</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-03T08:01:06Z</dc:date>
    </item>
    <item>
      <title>Seems to be the bug only as</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553511#M236940</link>
      <description>&lt;P&gt;Seems to be the bug only as per my knowledge while looking at the issue.&lt;/P&gt;&lt;P&gt;Can you remove all the rules and object-group once and restart the firewall.... then you configure once again with the object-group and NAT rules..... and then try to access all the required access.&lt;/P&gt;&lt;P&gt;Either you can go with TAC case or you can try with next OS version which has the fixed release of this bug.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 08:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553511#M236940</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-03T08:44:08Z</dc:date>
    </item>
    <item>
      <title>In your original post you had</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553512#M236941</link>
      <description>&lt;P&gt;In your original post you had this configurtion posted:&lt;/P&gt;&lt;P&gt;object ironport&lt;/P&gt;&lt;P&gt;host 10.2.129.95&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static 10.7.128.172 service tcp smtp smtp&lt;/P&gt;&lt;P&gt;This makes me assume that both incoming and outgoing email should be passing through the email security appliance.&amp;nbsp; Then when you added the following commands:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (lan_Servers,outside1) static 10.7.128.172 service tcp imap4 imap4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (lan_Servers,outside1) static 10.7.128.172 service tcp pop3 pop3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Depending on what email you are using (local exchange server or an external provider) your incomming mail will bypass the ironport but your mail server is still sending to the ironport before it is leaving the network.&lt;/P&gt;&lt;P&gt;Are you able to send and receive successfully within your network?&amp;nbsp; If this is an exchange server that is configured correctly mail within the domain and within the LAN should be successful.&lt;/P&gt;&lt;P&gt;Does the ironport have a connection to both the LAN and the DMZ? or does all mail traffic flow through the ASA to the Ironport?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 08:59:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553512#M236941</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-03T08:59:27Z</dc:date>
    </item>
    <item>
      <title>Although this could be a bug.</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553513#M236942</link>
      <description>&lt;P&gt;Although this could be a bug...though I doubt it since there is an email security appliance involved here...I would rule out the ironport first before starting to remove configs and reload..etc.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 09:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553513#M236942</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-03T09:06:00Z</dc:date>
    </item>
    <item>
      <title>Hello MariusGunnerud,You</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553514#M236943</link>
      <description>&lt;P&gt;Hello MariusGunnerud,&lt;/P&gt;&lt;P&gt;You assumed right.All mail communication (incoming,outgoing) passes through cisco ASA. The protocols (http,https, imap,pop3) bypass ironport to my internal exchange server. The smtp is forwarded to ironport with the rule:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (dmz_webservers,outside1) static 10.7.128.172 service tcp smtp smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ironport is&amp;nbsp; connected to the dmz zone (for mail traffic) and management vlan (for control traffic). I used "show run | include nat"&amp;nbsp; to copy the configuration from my firewall...that is why I refered only about&amp;nbsp; "nat (dmz_webservers,outside1) static 10.7.128.172 service tcp smtp smtp". The complete configuation is:&lt;/P&gt;&lt;P&gt;object network ironport&lt;/P&gt;&lt;P&gt;host 10.2.129.95&lt;/P&gt;&lt;P&gt;nat (dmz_webservers,outside1) static 10.7.128.172 service tcp smtp smtp&lt;/P&gt;&lt;P&gt;At the mean time I use my old firewall (ASA version 8.4.2) with all the above commands and I can receive and send e-mails.Though with ASA 5515-X this configuration does not work right.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 09:36:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553514#M236943</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-03T09:36:51Z</dc:date>
    </item>
    <item>
      <title> From what to metioned</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553515#M236944</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what to metioned KarthiKI think the best option is to upgrade my firmware. In Cisco site I found only one version 9.1.5. Is 9.1.5(1) a special OS version and where can I founf it?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 09:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553515#M236944</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-03T09:39:48Z</dc:date>
    </item>
    <item>
      <title>Would you be able to post the</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553516#M236945</link>
      <description>&lt;P&gt;Would you be able to post the full running configs (sanitised) of both firewalls, perhaps we will catch something that you missed (though doubtful but worth a look).&lt;/P&gt;&lt;P&gt;Also, when you get the chance, could you run a packet capture on the ASA for the mail server to see if the outgoing traffic actually hits the inside interface.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 09:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553516#M236945</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-03T09:51:07Z</dc:date>
    </item>
    <item>
      <title>Hi,You can use 9.2.2 version</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553517#M236946</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can use 9.2.2 version where it got fixed.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/release/notes/asarn92.html#pgfId-762517&lt;/P&gt;&lt;P&gt;Lets see if the issue gets resolved for you. Hoping for the best.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 09:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553517#M236946</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-03T09:54:31Z</dc:date>
    </item>
    <item>
      <title>I will post tommorow the full</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553518#M236947</link>
      <description>&lt;P&gt;I will post tommorow the full configuration of both firewalls to ckeck if the is a difference. May be I have missed something.Two or three pair of eyes is better than one.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 10:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553518#M236947</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-03T10:10:19Z</dc:date>
    </item>
    <item>
      <title>Hello MariusGunneud,I send</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553519#M236948</link>
      <description>&lt;P&gt;Hello MariusGunneud,&lt;/P&gt;&lt;P&gt;I send you the full configuration of the firewall that I currently use (cisco ASA 5520) and of my new firewall (cisco ASA 5515)....I omitted the configuration of remote ssl vpn for security reasons. Commands with blue colors are related with NAT. In the new firewall configuration I have some commands with red colors.I have added these commands and the http to my exchange worked (for version 9.1). There might be some different commands because I use every day ASA5520 and I perform changes but NAT configuration is the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you see any error or mistake please inform me. Thank You.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 08:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553519#M236948</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-04T08:46:04Z</dc:date>
    </item>
    <item>
      <title>Hello MariusGunneud,I send</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553520#M236949</link>
      <description>&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P&gt;Hello MariusGunneud,&lt;/P&gt;&lt;P&gt;I send you the full configuration of the firewall that I currently use (cisco ASA 5520) and of my new firewall (cisco ASA 5515)....I omitted the configuration of remote ssl vpn for security reasons. Commands with blue colors are related with NAT. In the new firewall configuration I have some commands with red colors.I have added these commands and the http to my exchange worked (for version 9.1). There might be some different commands because I use every day ASA5520 and I perform changes but NAT configuration is the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you see any error or mistake please inform me. Thank You.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 04 Jul 2014 08:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553520#M236949</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-04T08:47:42Z</dc:date>
    </item>
    <item>
      <title>Hello nkarthikeyan,I upgraded</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553521#M236950</link>
      <description>&lt;P&gt;Hello nkarthikeyan,&lt;/P&gt;&lt;P&gt;I upgraded the ASA version to 9.2.2 and I think it got fixed. I am not sure yet. I removed any extra NAT commands that I added&amp;nbsp; the last week and I left the original NAT commands of my 5520 firewall. I created a lab environment to check the http protocol (http forwarding) and it worked. This sunday I will try again the migration and I hope the&amp;nbsp; smtp protocol&amp;nbsp; to work fine for both incoming and outgoing mail traffic.&lt;/P&gt;&lt;P&gt;I will let you know about the results of 5515 integration and I will rate all answers. Thank you in advance.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 10:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553521#M236950</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-04T10:23:50Z</dc:date>
    </item>
    <item>
      <title>Hi, Great to hear that issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553522#M236951</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Great to hear that issue is getting resolved. You can validate the same in production environment and do let know if any concerns. Thanks!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2014 15:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553522#M236951</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-04T15:38:57Z</dc:date>
    </item>
    <item>
      <title>could you a packet tracer to</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553523#M236952</link>
      <description>&lt;P&gt;could you a packet tracer to see how the flow of traffic is through the firewall:&lt;/P&gt;&lt;P&gt;packet-tracer input lan_Servers tcp 10.2.128.43 12345 4.2.2.2 25 detail&lt;/P&gt;&lt;P&gt;packet-tracer input outside1 tcp 4.2.2.2 12345 10.7.128.172 25 detail&lt;/P&gt;&lt;P&gt;Post the result here please.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jul 2014 08:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553523#M236952</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-05T08:36:18Z</dc:date>
    </item>
    <item>
      <title>Hi!I tried at last the</title>
      <link>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553524#M236953</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I tried at last the firewall with the new firmware 9.2 version and I was dissapointed. The Nat did not work at all either for incoming or outgoing flows.. As I was advised I left only the static nat rules for the port forwarding of incoming flows...Though I could not send an outgoing email, I could not get an incoming email&amp;nbsp; and I could not access the exchange owa. In addition I observed that cisco changed the nat rules a bit at version 9.2.&lt;/P&gt;&lt;P&gt;But this time I have logs and I have used the packet tracer commands tha you told me to use.So using:&lt;/P&gt;&lt;P&gt;asayppo# packet-tracer input lan_Servers tcp 10.2.128.43 12345 4.2.2.2 25 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b275070, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=609599, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=lan_Servers, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via 10.7.128.169, outside1&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log &amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group lan_servers_list in interface lan_Servers&lt;BR /&gt;access-list lan_servers_list extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b993090, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=11859, user_data=0x7fff2430ab80, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=lan_Servers, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a652170, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=73294, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b27cd60, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=28792, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=lan_Servers, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2c67dbf0, priority=13, domain=dynamic-filter, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=9911, user_data=0x7fff2c67d120, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=lan_Servers, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2c682620, priority=12, domain=UNKNOWN:59, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10632, user_data=0x7fff2c6825c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=lan_Servers, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map ips&lt;BR /&gt;&amp;nbsp;match access-list IPS&lt;BR /&gt;policy-map my-ips-policy&lt;BR /&gt;&amp;nbsp;class ips&lt;BR /&gt;&amp;nbsp; ips inline fail-open&lt;BR /&gt;service-policy my-ips-policy interface outside1&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff3034f1c0, priority=51, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19652, user_data=0x7fff3034d9c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=outside1&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff2c67b480, priority=13, domain=dynamic-filter, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19652, user_data=0x7fff2c679050, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=outside1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff2c6815d0, priority=12, domain=UNKNOWN:59, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19652, user_data=0x7fff2c6811d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=outside1&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a652170, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=73296, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b12a9c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=30666, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 49672, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: lan_Servers&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;-----------------------------------------&lt;/P&gt;&lt;P&gt;Also:&lt;/P&gt;&lt;P&gt;&amp;nbsp;packet-tracer input outside1 tcp 4.2.2.2 12345 10.7.128.172 25 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b122cd0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=630195, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network CultEmailEDGE&lt;BR /&gt;&amp;nbsp;nat (dmz_webservers,outside1) static 10.7.128.172 service tcp smtp smtp&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface dmz_webservers&lt;BR /&gt;Untranslate 10.7.128.172/25 to 10.2.129.95/25&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_INBOUND in interface outside1&lt;BR /&gt;access-list OUTSIDE_INBOUND extended permit tcp any object ironport eq smtp&lt;BR /&gt;access-list OUTSIDE_INBOUND remark *** ALLOW PACKETS FROM OUTSIDE INWARDS ***&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b8a6070, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1135, user_data=0x7fff24326080, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.2.129.95, mask=255.255.255.255, port=25, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a652170, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=83579, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b12a9c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=35237, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map ips&lt;BR /&gt;&amp;nbsp;match access-list IPS&lt;BR /&gt;policy-map my-ips-policy&lt;BR /&gt;&amp;nbsp;class ips&lt;BR /&gt;&amp;nbsp; ips inline fail-open&lt;BR /&gt;service-policy my-ips-policy interface outside1&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff3034df10, priority=51, domain=ids, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12295, user_data=0x7fff3034d9c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2c608460, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12235, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2c679b20, priority=13, domain=dynamic-filter, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12295, user_data=0x7fff2c679050, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2c681230, priority=12, domain=UNKNOWN:59, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12295, user_data=0x7fff2c6811d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map CONNS&lt;BR /&gt;&amp;nbsp;match access-list CONNS&lt;BR /&gt;policy-map CONNS&lt;BR /&gt;&amp;nbsp;class CONNS&lt;BR /&gt;&amp;nbsp; set connection conn-max 0 embryonic-conn-max 500 random-sequence-number enable&lt;BR /&gt;&amp;nbsp; set connection timeout idle 1193:02:47 embryonic 0:20:00 half-closed 0:10:00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; embryonic 0:20:00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: disabled, retry-interval 0:00:15, max-retries 5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: client-probe 0, server-probe 0, conn-expiration 0&lt;BR /&gt;service-policy CONNS interface dmz_webservers&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff2cfa4340, priority=8, domain=conn-set, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10059, user_data=0x7fff2cf9c8f0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.2.129.0, mask=255.255.255.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=dmz_webservers&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network CultEmailEDGE&lt;BR /&gt;&amp;nbsp;nat (dmz_webservers,outside1) static 10.7.128.172 service tcp smtp smtp&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff2b87c580, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=748, user_data=0x7fff2b87aa60, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.2.129.95, mask=255.255.255.255, port=25, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside1, output_ifc=dmz_webservers&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a652170, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=83581, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b5ae440, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19775, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=dmz_webservers, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 56870, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_ids&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;input-interface: outside1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz_webservers&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;-------------------------------------------------&lt;/P&gt;&lt;P&gt;In addition I saw two stange logs:&lt;/P&gt;&lt;P&gt;1.The first one had to do with assymetric nat&lt;/P&gt;&lt;P&gt;5&amp;nbsp;&amp;nbsp; &amp;nbsp;Jul 13 2014&amp;nbsp;&amp;nbsp; &amp;nbsp;11:34:34&amp;nbsp;&amp;nbsp; &amp;nbsp;305013&amp;nbsp;&amp;nbsp; &amp;nbsp;65.55.111.141&amp;nbsp;&amp;nbsp; &amp;nbsp;51143&amp;nbsp;&amp;nbsp; &amp;nbsp;10.2.129.95&amp;nbsp;&amp;nbsp; &amp;nbsp;25&amp;nbsp;&amp;nbsp; &amp;nbsp;Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside1:65.55.111.141/51143 dst dmz_webservers:10.2.129.95/25 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;----------&lt;/P&gt;&lt;P&gt;2.Secondly I was getting a lot of smtp incoming traffic to an internal address that I do not use at all and of course the flow was denied.&lt;/P&gt;&lt;P&gt;4&amp;nbsp;&amp;nbsp; &amp;nbsp;Jul 13 2014&amp;nbsp;&amp;nbsp; &amp;nbsp;11:34:29&amp;nbsp;&amp;nbsp; &amp;nbsp;106023&amp;nbsp;&amp;nbsp; &amp;nbsp;95.211.122.21&amp;nbsp;&amp;nbsp; &amp;nbsp;43456&amp;nbsp;&amp;nbsp; &amp;nbsp;10.2.145.22&amp;nbsp;&amp;nbsp; &amp;nbsp;25&amp;nbsp;&amp;nbsp; &amp;nbsp;Deny tcp src outside1:95.211.122.21/43456 dst inside_data:10.2.145.22/25 by access-group "OUTSIDE_INBOUND" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;-------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jul 2014 06:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-asa-9-1/m-p/2553524#M236953</guid>
      <dc:creator>apapakons</dc:creator>
      <dc:date>2014-07-14T06:45:28Z</dc:date>
    </item>
  </channel>
</rss>

