<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I do not think there is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482247#M238108</link>
    <description>&lt;P&gt;I do not think there is anything missing in the configuration...I have been meaning to lab this but I don't have access to any ASAs running 8.2.&lt;/P&gt;&lt;P&gt;Would you be able to open a TAC case to see what Cisco has to say about this?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Fri, 06 Jun 2014 07:36:13 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-06-06T07:36:13Z</dc:date>
    <item>
      <title>ASA Outside NAT Problem!!!</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482217#M238075</link>
      <description>&lt;P&gt;Hi everybody,&lt;/P&gt;&lt;P&gt;My situation is as follows:&lt;BR /&gt;My &lt;U&gt;Pre 8.3 ASA&lt;/U&gt; is connected to two outside networks: the ISP with security level 0, and a separate agency network with security level 10. &amp;nbsp;We are having a problem connecting to the agency network from a L2L VPN tunnel coming through the ISP interface. &amp;nbsp;These VPN branch users can communicate with our entire corporate network and I'm currently using outside-to-outside nat to get them to talk to the internet out the same ISP interface they come in through, but they can't talk to the agency network at all. *All inside users have full communication with the agency network.* &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I receive the following error:&lt;/STRONG&gt;&lt;BR /&gt;------------------------------&lt;BR /&gt;asa1# sh nat outside agency&lt;BR /&gt;ERROR: No matching NAT policy found&lt;BR /&gt;------------------------------&lt;BR /&gt;If I statically nat one user from the VPN branch to one of the agency pool addresses, I have full connectivity between that VPN user and the agency network.&lt;BR /&gt;This command makes it work: static (outside,agency) 16x.5x.1x.12x 10.18.1.1&lt;/P&gt;&lt;P&gt;My configuration:&lt;BR /&gt;nat (outside) 20 access-list vpn_outside_nat&lt;BR /&gt;nat (inside) 0 access-list NONAT&lt;BR /&gt;nat (inside) 30 access-list inside_nat_outbound&lt;BR /&gt;nat (inside) 20 0.0.0.0 0.0.0.0&lt;BR /&gt;global (agency) 20 16x.5x.1x.1x-1x.5x.1x.12x&lt;BR /&gt;global (agency) 20 16x.5x.1x.1x&lt;BR /&gt;global (outside) 20 20x.1x.2x.1x&lt;BR /&gt;global (outside) 10 20x.1x.2x.1x netmask 255.255.255.0&lt;BR /&gt;global (outside) 30 20x.1x.2x.1x netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list vpn_outside_nat extended permit ip 10.0.0.0 255.0.0.0 any&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip any 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound extended permit ip host 192.168.1.12 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please let me know if you need any more information to help. &amp;nbsp;I appreciate any answers! &amp;nbsp;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482217#M238075</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2019-03-12T04:15:26Z</dc:date>
    </item>
    <item>
      <title>If Im reading this correctly</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482218#M238077</link>
      <description>&lt;P&gt;If Im reading this correctly you are trying to connect two VPN sites through the same interface.&lt;/P&gt;&lt;P&gt;try: (config)#same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;this allows communication between peers connected to the same interface&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 12:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482218#M238077</guid>
      <dc:creator>mickyq</dc:creator>
      <dc:date>2014-05-29T12:45:59Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply.  That</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482219#M238079</link>
      <description>&lt;P&gt;Thanks for the reply. &amp;nbsp;That isn't what I'm trying to accomplish, though. &amp;nbsp;That particular part already works just fine. These are two different interfaces (outside, sec.=0, agency, sec.=10). &amp;nbsp;The issue is that the VPN users on the outside interface can't communicate with the users in the agency network.&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 14:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482219#M238079</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-05-29T14:08:07Z</dc:date>
    </item>
    <item>
      <title>Are the VPN user connecting</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482220#M238080</link>
      <description>&lt;P&gt;Are the VPN user connecting over a site to site VPN or is this a remote access VPN solution?&lt;/P&gt;&lt;P&gt;is the agency network traffic comming in on the agency interface?&amp;nbsp; if so then you are missing a no nat statement for that interface.&lt;/P&gt;&lt;P&gt;If that doesn't work, please post a network diagram indicating how the agency network and VPN network connects to the ASA.&lt;/P&gt;&lt;P&gt;Also run a packet tracer while the VPN user PC is connect to the VPN and post the results here.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input agency tcp &amp;lt;agency IP&amp;gt; 12345 &amp;lt;VPN IP&amp;gt; 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 20:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482220#M238080</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-29T20:28:11Z</dc:date>
    </item>
    <item>
      <title>The VPN users are connecting</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482221#M238081</link>
      <description>&lt;P&gt;The VPN users are connecting over a site to site VPN from an 1841 to the ASA.&lt;/P&gt;&lt;P&gt;I tried the no nat statement for the agency interface, and still no communication. &amp;nbsp;I even tried a dynamic nat statement for it, and still nothing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the output of the packet-tracer:&lt;/P&gt;&lt;P&gt;asa1# packet- input agency tcp 1xx.5x.3x.1x 12345 10.18.1.1 80 det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_agency in interface agency&lt;BR /&gt;access-list acl_agency extended permit ip host 1xx.5x.3x.1x 10.0.0.0 255.0.0.0&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xcb954718, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=1, user_data=0xcbf4fc78, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=1xx.5x.3x.1x, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=10.0.0.0, mask=255.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xc88014f8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=496265, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xcb8c98b0, priority=70, domain=inspect-http, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=20, user_data=0xcb8c8fb0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=80&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xcc99ae50, priority=70, domain=encrypt, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=35412, user_data=0x132f3dac, cs_id=0xd4f14878, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=10.18.0.0, mask=255.255.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xd06f1c50, priority=69, domain=ipsec-tunnel-flow, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=38406, user_data=0x132f6b24, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=10.18.0.0, mask=255.255.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside) 20 access-list vpn_outside_nat&lt;BR /&gt;&amp;nbsp; match ip outside 10.0.0.0 255.0.0.0 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 20 (2x.1x.2x.1x)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 80054, untranslate_hits = 7242&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xd4f0e198, priority=2, domain=host, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=265627, user_data=0xcd09b6d8, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=10.0.0.0, mask=255.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xc87f2bc0, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=864567193, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1039870772, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_encrypt&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_ipsec_tunnel_flow&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: agency&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 22:34:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482221#M238081</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-05-29T22:34:07Z</dc:date>
    </item>
    <item>
      <title>From the output of the packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482222#M238082</link>
      <description>&lt;P&gt;From the output of the packet tracer I would say that the problem is at the remote s2s vpn device.&amp;nbsp; The packet is allowed and it is entering and exiting the correct interfaces.&lt;/P&gt;&lt;P&gt;Have a look at the remote device..if you have admin access to it that is. Otherwise as the administrators of the remote site to check their configuration, more specifically their no nat statements and the crypto ACLs.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2014 22:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482222#M238082</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-29T22:40:54Z</dc:date>
    </item>
    <item>
      <title>I've looked at the remote</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482223#M238083</link>
      <description>&lt;P&gt;I've looked at the remote 1841 and everything looks fine. &amp;nbsp;There is no nat being performed at all, because it is used strictly for VPN access, and the crypto ACLs specify that anything coming from 10.18.0.0 (that branch's subnet) should be placed in the tunnel.&lt;/P&gt;&lt;P&gt;Traffic flows from this VPN network to ANYWHERE else just fine (inside and outside) through our ASA. &amp;nbsp;It just doesn't go to the agency network.&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 00:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482223#M238083</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-05-30T00:20:04Z</dc:date>
    </item>
    <item>
      <title>Could you please post a</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482224#M238084</link>
      <description>&lt;P&gt;Could you please post a network diagram of how this solution connects together.&lt;/P&gt;&lt;P&gt;How are you testing the connectivity over the VPN?&lt;/P&gt;&lt;P&gt;On the ASA...and on the 1841 router issue the command &lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt; and &lt;STRONG&gt;show crypto isakmp&lt;/STRONG&gt; (the isakmp command might differ on the ASA depending on the version you are running).&lt;/P&gt;&lt;P&gt;Please post a full running config of both sides of the tunnel (sanitised) aswell.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 09:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482224#M238084</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-30T09:43:53Z</dc:date>
    </item>
    <item>
      <title>I've attached a small diagram</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482225#M238085</link>
      <description>&lt;P&gt;I've attached a small diagram illustrating the network. &amp;nbsp;&lt;/P&gt;&lt;P&gt;To test connectivity from the VPN, I'm simply pinging from a client on that network to a client on the agency network. &amp;nbsp;The VPN clients are private addresses and the agency network is all public addresses.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here's the output on the 1841:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;xxxx-xx-1841#sh crypto ipsec sa&lt;/P&gt;&lt;P&gt;interface: FastEthernet0/0/0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Crypto map tag: CRYPTO-MAP, local addr 2xx.1xx.2xx.2xx&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;protected vrf: (none)&lt;BR /&gt;&amp;nbsp; &amp;nbsp;local &amp;nbsp;ident (addr/mask/prot/port): (10.18.0.0/255.255.0.0/0/0)&lt;BR /&gt;&amp;nbsp; &amp;nbsp;remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;BR /&gt;&amp;nbsp; &amp;nbsp;current_peer 2xx.1xx.2xx.1xx port 500&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;PERMIT, flags={origin_is_acl,}&lt;BR /&gt;&amp;nbsp; &amp;nbsp; #pkts encaps: 43532623, #pkts encrypt: 43532623, #pkts digest: 43532623&lt;BR /&gt;&amp;nbsp; &amp;nbsp; #pkts decaps: 45942079, #pkts decrypt: 45942079, #pkts verify: 45942079&lt;BR /&gt;&amp;nbsp; &amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; #send errors 2150, #recv errors 8&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;local crypto endpt.: 2xx.1xx.2xx.2xx, remote crypto endpt.: 2xx.1xx.2xx.1xx&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0/0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;current outbound spi: 0x636A5937(1667914039)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;PFS (Y/N): N, DH group: none&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;inbound esp sas:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; spi: 0xFDEEF343(4260295491)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; in use settings ={Tunnel, }&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; conn id: 2263, flow_id: FPGA:263, sibling_flags 80000046, crypto map: CRYPTO-MAP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sa timing: remaining key lifetime (k/sec): (4417816/3413)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;inbound ah sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;inbound pcp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;outbound esp sas:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; spi: 0x636A5937(1667914039)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; transform: esp-3des esp-sha-hmac ,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; in use settings ={Tunnel, }&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; conn id: 2264, flow_id: FPGA:264, sibling_flags 80000046, crypto map: CRYPTO-MAP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sa timing: remaining key lifetime (k/sec): (4427473/3413)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Status: ACTIVE&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;outbound ah sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;outbound pcp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here's the output on the ASA:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;asa1# sh crypto isakmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Active SA: 9&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 9&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;5 &amp;nbsp; IKE Peer: 2xx.1xx.2xx.2xx&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Type &amp;nbsp; &amp;nbsp;: L2L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Role &amp;nbsp; &amp;nbsp;: initiator&lt;BR /&gt;&amp;nbsp; &amp;nbsp; Rekey &amp;nbsp; : no &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;State &amp;nbsp; : MM_ACTIVE&lt;/P&gt;&lt;P&gt;Global IKE Statistics&lt;BR /&gt;Active Tunnels: 8&lt;BR /&gt;Previous Tunnels: 11083&lt;BR /&gt;In Octets: 4196166801&lt;BR /&gt;In Packets: 1330363&lt;BR /&gt;In Drop Packets: 580269&lt;BR /&gt;In Notifys: 104767&lt;BR /&gt;In P2 Exchanges: 54915&lt;BR /&gt;In P2 Exchange Invalids: 107&lt;BR /&gt;In P2 Exchange Rejects: 42300&lt;BR /&gt;In P2 Sa Delete Requests: 19&lt;BR /&gt;Out Octets: 159932732&lt;BR /&gt;Out Packets: 1428588&lt;BR /&gt;Out Drop Packets: 2343&lt;BR /&gt;Out Notifys: 631581&lt;BR /&gt;Out P2 Exchanges: 21275&lt;BR /&gt;Out P2 Exchange Invalids: 0&lt;BR /&gt;Out P2 Exchange Rejects: 0&lt;BR /&gt;Out P2 Sa Delete Requests: 29494&lt;BR /&gt;Initiator Tunnels: 109440&lt;BR /&gt;Initiator Fails: 108383&lt;BR /&gt;Responder Fails: 143692&lt;BR /&gt;System Capacity Fails: 0&lt;BR /&gt;Auth Fails: 143040&lt;BR /&gt;Decrypt Fails: 0&lt;BR /&gt;Hash Valid Fails: 0&lt;BR /&gt;No Sa Fails: 394232&lt;/P&gt;&lt;P&gt;Global IPSec over TCP Statistics&lt;BR /&gt;--------------------------------&lt;BR /&gt;Embryonic connections: 0&lt;BR /&gt;Active connections: 0&lt;BR /&gt;Previous connections: 0&lt;BR /&gt;Inbound packets: 0&lt;BR /&gt;Inbound dropped packets: 0&lt;BR /&gt;Outbound packets: 0&lt;BR /&gt;Outbound dropped packets: 0&lt;BR /&gt;RST packets: 0&lt;BR /&gt;Recevied ACK heart-beat packets: 0&lt;BR /&gt;Bad headers: 0&lt;BR /&gt;Bad trailers: 0&lt;BR /&gt;Timer failures: 0&lt;BR /&gt;Checksum errors: 0&lt;BR /&gt;Internal errors: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Running-config on 1841:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 2315 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.4&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging message-counter syslog&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;dot11 syslog&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip domain lookup source-interface FastEthernet0/1.181&lt;BR /&gt;ip name-server 10.1.4.22&lt;BR /&gt;ip name-server 192.168.1.53&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;password encryption aes&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt;&amp;nbsp;log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;&amp;nbsp;encr 3des&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;crypto isakmp key 6 xxx address 2xx.1xx.2xx.1xx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set TRANSFORM-SET esp-3des esp-sha-hmac&lt;BR /&gt;!&lt;BR /&gt;crypto map CRYPTO-MAP 1 ipsec-isakmp&lt;BR /&gt;&amp;nbsp;set peer 2xx.1xx.2xx.1xx&lt;BR /&gt;&amp;nbsp;set transform-set TRANSFORM-SET&lt;BR /&gt;&amp;nbsp;match address VPN-TRAFFIC&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;track 1 interface FastEthernet0/0 line-protocol&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Loopback1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.181&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 181&lt;BR /&gt;&amp;nbsp;ip address 10.18.1.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.1.4.22&lt;BR /&gt;&amp;nbsp;ip helper-address 192.168.1.58&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.182&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 182&lt;BR /&gt;&amp;nbsp;ip address 10.18.2.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.1.4.22&lt;BR /&gt;&amp;nbsp;ip helper-address 192.168.1.58&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0/0&lt;BR /&gt;&amp;nbsp;ip address 2xx.1xx.2xx.2xx 255.255.255.252&lt;BR /&gt;&amp;nbsp;ip access-group block_untrusted_remote in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;crypto map CRYPTO-MAP&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0/1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 FastEthernet0/0 track 1&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 2xx.1xx.2xx.2xx&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended VPN-TRAFFIC&lt;BR /&gt;&amp;nbsp;permit ip 10.18.0.0 0.0.255.255 any&lt;BR /&gt;ip access-list extended block_untrusted_remote&lt;BR /&gt;&amp;nbsp;permit ip 2xx.1xx.2xx.1xx 0.0.0.15 any&lt;BR /&gt;&amp;nbsp;permit ip host 2xx.1xx.2xx.2xx host 2xx.1xx.2xx.2xx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;B&gt;Running-config on ASA:&lt;/B&gt;&lt;/P&gt;&lt;P&gt;hostname asa1&lt;BR /&gt;names&lt;BR /&gt;name 192.168.6.0 VLAN6&lt;BR /&gt;name 192.168.4.0 VLAN4&lt;BR /&gt;name 192.168.5.0 VLAN5&lt;BR /&gt;name 192.168.0.0 Inside-subnet&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 2xx.1xx.2xx.178 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.12.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif agency&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 1xx.5xx.1xx.3 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;description DMZ interface&lt;BR /&gt;&amp;nbsp;nameif DMZ2&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.30.30.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.3 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;time-range 5:30p&lt;BR /&gt;&amp;nbsp;absolute end 17:30 17 January 2014&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa803-k8.bin&lt;BR /&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list acl_agency extended permit ip any host 1xx.5xx.1xx.123&lt;BR /&gt;access-list acl_agency extended permit ip host 1xx.5xx.3xx.130 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list inside_nat_outbound extended permit ip host 192.168.1.12 any&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip any 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list l2l_vpn-branch extended permit ip any 10.18.0.0 255.255.0.0&lt;BR /&gt;access-list vpn_outside_nat extended permit ip 10.0.0.0 255.0.0.0 any&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu agency 1500&lt;BR /&gt;mtu DMZ2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;failover polltime unit 15 holdtime 45&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any unreachable outside&lt;BR /&gt;asdm image disk0:/asdm-603.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 20 2xx.1xx.2xx.190&lt;BR /&gt;global (outside) 10 2xx.1xx.2xx.185 netmask 255.255.255.0&lt;BR /&gt;global (outside) 30 2xx.1xx.2xx.184 netmask 255.255.255.255&lt;BR /&gt;global (agency) 20 1xx.5xx.1xx.10-1xx.5xx.1xx.122&lt;BR /&gt;global (agency) 20 1xx.5xx.1xx.125&lt;BR /&gt;nat (outside) 20 access-list vpn_outside_nat&lt;BR /&gt;nat (inside) 0 access-list NONAT&lt;BR /&gt;nat (inside) 30 access-list inside_nat_outbound&lt;BR /&gt;nat (inside) 20 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,agency) 1xx.5xx.1xx.123 10.1.4.45 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group acl_out in interface outside&lt;BR /&gt;access-group acl_inside in interface inside&lt;BR /&gt;access-group acl_agency in interface agency&lt;/P&gt;&lt;P&gt;route inside 10.18.0.0 255.255.0.0 192.168.12.2 1 track 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 2xx.1xx.2xx.177 1&lt;BR /&gt;route inside 10.1.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.2.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.3.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.4.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.5.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.6.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.7.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.8.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.9.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.10.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.11.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.12.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.13.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.14.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.16.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 10.17.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route agency 1xx.1xx.1xx.0 255.255.255.0 1xx.5xx.1xx.1 1&lt;BR /&gt;route agency 1xx.5xx.3xx.0 255.255.255.0 1xx.5xx.1xx.1 1&lt;BR /&gt;route agency 1xx.5xx.6xx.0 255.255.255.0 1xx.5xx.1xx.1 1&lt;BR /&gt;route inside 172.16.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 172.17.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 172.19.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 172.31.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 172.32.0.0 255.255.0.0 192.168.12.2 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside 192.168.2.0 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside 192.168.3.0 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside VLAN4 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside VLAN5 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside VLAN6 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside 192.168.8.0 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside 192.168.11.0 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside 192.168.13.0 255.255.255.0 192.168.12.2 1&lt;BR /&gt;route inside 192.168.254.0 255.255.255.0 192.168.12.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;BR /&gt;http 10.2.0.0 255.255.0.0 inside&lt;BR /&gt;http 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 10.18.1.1 interface inside&lt;BR /&gt;&amp;nbsp;num-packets 3&lt;BR /&gt;&amp;nbsp;timeout 1000&lt;BR /&gt;&amp;nbsp;frequency 3&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set esp-des esp-des esp-none&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map CHCS 10 match address l2l_vpn-branch&lt;BR /&gt;crypto map CHCS 10 set peer 2xx.1xx.2xx.2xx&lt;BR /&gt;crypto map CHCS 10 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map CHCS interface outside&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 20&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 43200&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 1 reachability&lt;/P&gt;&lt;P&gt;management-access management&lt;BR /&gt;priority-queue outside&lt;BR /&gt;&amp;nbsp; queue-limit &amp;nbsp; 2000&lt;BR /&gt;&amp;nbsp; tx-ring-limit 15&lt;BR /&gt;priority-queue inside&lt;BR /&gt;&amp;nbsp; queue-limit &amp;nbsp; 2000&lt;BR /&gt;&amp;nbsp; tx-ring-limit 15&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;tunnel-group 2xx.1xx.2xx.2xx type ipsec-l2l&lt;BR /&gt;tunnel-group 2xx.1xx.2xx.2xx ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 17:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482225#M238085</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-05-30T17:03:30Z</dc:date>
    </item>
    <item>
      <title>Just out of curiosity, any</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482226#M238086</link>
      <description>&lt;P&gt;Just out of curiosity, any reason why you have this in your configuration on the 1841?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface FastEthernet0/0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 0.0.0.0 0.0.0.0 FastEthernet0/0 track 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Should the following command be pointing out the outside interface, isn't the 1841 located off the outside interface? If so then this is part of the problem. change it to point out the correct interface and correct next hop IP.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 10.18.0.0 255.255.0.0 192.168.12.2 1 track 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Also you need to have a no NAT for the agency interface.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (agency) 0 access-list NONAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Please correct these and test, and let us know how it goes.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 20:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482226#M238086</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-30T20:43:11Z</dc:date>
    </item>
    <item>
      <title>That statement on the 1841</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482227#M238087</link>
      <description>&lt;P&gt;That statement on the 1841 and ASA were for testing a failover between INSIDE MPLS and OUTSIDE VPN. &amp;nbsp;We haven't gotten to that point yet but it was in the works. &amp;nbsp;The routing tables on both the 1841 and the ASA are both using their default routes at the moment for communication. &amp;nbsp;You can ignore the statements referring to tracking objects, sorry I didn't mention it.&lt;/P&gt;&lt;P&gt;I tried adding a nat exemption statement on the ASA again and it didn't make a difference. &amp;nbsp;I have a strong feeling that my troubles are somehow because of this error. When I added the NONAT statement, I was at least able to get an output from the first command, but still not the second, as mentioned in my first post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa1# sh nat agency outside&lt;BR /&gt;&amp;nbsp; match ip agency any outside 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;asa1# sh nat outside agency&lt;BR /&gt;ERROR: No matching NAT policy found&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2014 21:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482227#M238087</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-05-30T21:05:46Z</dc:date>
    </item>
    <item>
      <title>Can you check if this is</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482228#M238088</link>
      <description>&lt;P&gt;Can you check if this is correct?&lt;/P&gt;&lt;P&gt;global (agency) 20 1xx.5xx.1xx.10-1xx.5xx.1xx.122&lt;BR /&gt;global (agency) 20 1xx.5xx.1xx.125&lt;BR /&gt;nat (outside) 20 access-list vpn_outside_nat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I can see there, you are translating the 10.18.0.0/16 remote network into a 1xx.5xx.1xx. IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try to do this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_to_agency_nonat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_to_agency_nonat permit ip 10.18.0.0 0.0.255.255 any&lt;/P&gt;</description>
      <pubDate>Sat, 31 May 2014 12:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482228#M238088</guid>
      <dc:creator>jpl861</dc:creator>
      <dc:date>2014-05-31T12:05:42Z</dc:date>
    </item>
    <item>
      <title>I've tried that, but they</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482229#M238089</link>
      <description>&lt;P&gt;I've tried that, but they still don't communicate. &amp;nbsp;I believe we need to be nat'ing to those global ip's in order to communicate with the agency network. &amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem seems to be that it's NOT translating the 10.18.0.0 network into a 1xx.5xx.1xx.xxx IP. &amp;nbsp;NAT doesn't seem to be working on anything going from the outside to the agency interface, for some reason.&lt;/P&gt;</description>
      <pubDate>Sat, 31 May 2014 16:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482229#M238089</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-05-31T16:23:46Z</dc:date>
    </item>
    <item>
      <title>Just for clarification, the</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482230#M238090</link>
      <description>&lt;P&gt;Just for clarification, the no nat statement needs to be implemented on the ingress interface for the non-encrypted traffic...so in this case the agency interface and not the outside interface.&lt;/P&gt;&lt;P&gt;Also when doing VPN you do not want to translate the VPN traffic to the public IP...this is the reason for the no nat.&lt;/P&gt;&lt;P&gt;I suggest issuing the command &lt;STRONG&gt;clear xlate&lt;/STRONG&gt; and then test connectivity.&amp;nbsp; If this setup is currently in use do so outside of working hours or during a service window...or atleast tell your users that they will lose connectivity for a short period of time.&amp;nbsp; I am thinking that you have had a NAT statement in your configuration that has included the agency subnet and it has not timed out.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 31 May 2014 18:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482230#M238090</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-31T18:56:11Z</dc:date>
    </item>
    <item>
      <title>Okay, I've tried to put a nat</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482231#M238091</link>
      <description>&lt;P&gt;Okay, I've tried to put a nat exemption coming from the agency interface and cleared the translation tables, but still no connectivity. &amp;nbsp;Any ideas?&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jun 2014 04:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482231#M238091</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-06-01T04:11:11Z</dc:date>
    </item>
    <item>
      <title>Could you add the no nat to</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482232#M238092</link>
      <description>&lt;P&gt;Could you add the no nat to the agency interface and then issue the packet tracer again.&lt;/P&gt;&lt;P&gt;I see that the NAT statements are missing from the 1841 could confirm that the traffic from the 10.18 network to the agency network is being exempted from NAT?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jun 2014 10:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482232#M238092</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-01T10:01:31Z</dc:date>
    </item>
    <item>
      <title>What about nat (agency) 0</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482233#M238093</link>
      <description>What about nat (agency) 0 access-list xxxx? This is a normal issue with return traffic sometimes as the return traffic is being dropped or translated into a different IP.</description>
      <pubDate>Sun, 01 Jun 2014 13:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482233#M238093</guid>
      <dc:creator>jpl861</dc:creator>
      <dc:date>2014-06-01T13:23:55Z</dc:date>
    </item>
    <item>
      <title>The poster has indicated that</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482234#M238094</link>
      <description>&lt;P&gt;The poster has indicated that he has added a nat 0 to the agency interface but the issue persists.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jun 2014 13:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482234#M238094</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-01T13:35:56Z</dc:date>
    </item>
    <item>
      <title>From the packet-tracer output</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482235#M238095</link>
      <description>&lt;P&gt;From the packet-tracer output, it seems that the return traffic coming from the VPN going to the agency network is being nat'ed to the global address that is only supposed to be for the outside interface instead of the global address intended for the agency network. That would explain why it can't communicate, but how do I fix this and get it to NAT to the global (agency) pool instead of the global (outside) pool?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the output:&lt;/P&gt;&lt;P&gt;asa1# packet-t input agency tcp 1xx.5xx.3xx.1xx 12345 10.18.1.1 80 det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_agency in interface agency&lt;BR /&gt;access-list acl_agency extended permit ip host 1xx.5xx.3xx.1xx 10.0.0.0 255.0.0.&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xcb954718, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=2, user_data=0xcbf4fc78, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=1xx.5xx.3xx.1xx, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=10.0.0.0, mask=255.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xc88014f8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=496646, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xcb8c98b0, priority=70, domain=inspect-http, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=21, user_data=0xcb8c8fb0, cs_id=0x0, use_real_addr, flags=0x0,&lt;BR /&gt;ocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=80&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT-EXEMPT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (agency) 0 access-list NONAT&lt;BR /&gt;&amp;nbsp; match ip agency any outside 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xcbd9e088, priority=6, domain=nat-exempt, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=0, user_data=0xcc144078, cs_id=0x0, use_real_addr, flags=0x0, p&lt;BR /&gt;col=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=10.0.0.0, mask=255.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xc7695f80, priority=70, domain=encrypt, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=5734, user_data=0x1338149c, cs_id=0xd4f14878, reverse, flags=0x&lt;BR /&gt;rotocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=10.18.0.0, mask=255.255.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xd06f2c40, priority=69, domain=ipsec-tunnel-flow, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=6035, user_data=0x13384f54, cs_id=0x0, reverse, flags=0x0, prot&lt;BR /&gt;=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=10.18.0.0, mask=255.255.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside) 20 access-list vpn_outside_nat&lt;BR /&gt;&amp;nbsp; match ip outside 10.0.0.0 255.0.0.0 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 20 (2xx.1xx.2xx.190)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 204581, untranslate_hits = 26424&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xd4f0e198, priority=2, domain=host, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=693456, user_data=0xcd09b6d8, cs_id=0x0, reverse, flags=0x0, pr&lt;BR /&gt;ol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=10.0.0.0, mask=255.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xc87f2bc0, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=872576652, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protoc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1048522497, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_encrypt&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_ipsec_tunnel_flow&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: agency&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jun 2014 23:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482235#M238095</guid>
      <dc:creator>andyc0313</dc:creator>
      <dc:date>2014-06-01T23:39:06Z</dc:date>
    </item>
    <item>
      <title>Even though it shows a match</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482236#M238096</link>
      <description>&lt;P&gt;Even though it shows a match on the NAT to the outside global, it is the NAT0 which takes precedence:&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (agency) 0 access-list NONAT&lt;BR /&gt;&amp;nbsp; match ip agency any outside 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;But to see if this is the issue, you could add a more specific ACL that matches the exact source and destination subnets.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2014 06:47:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-nat-problem/m-p/2482236#M238096</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-02T06:47:23Z</dc:date>
    </item>
  </channel>
</rss>

