<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Have you run a packet tracer in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471695#M238138</link>
    <description>&lt;P&gt;Have you run a packet tracer on the ASA? If not please run the following command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ tcp 172.168.200.10 12345 4.2.2.2 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ tcp 172.168.200.10 12345 4.2.2.2 443 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Could you also post the output of the object group INTERNET-TCP and INTERNET-UDP&lt;/P&gt;&lt;P&gt;Also please check the logs when connecting to the internet from the servers, do you see anything that might be out of place?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
    <pubDate>Tue, 27 May 2014 11:28:12 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-05-27T11:28:12Z</dc:date>
    <item>
      <title>NAT ISSUE ASA 5505 VERSION 9.1</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471694#M238135</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I have a firewall asa 5505 and behind it in the DMZ zone i have a windows server 2012 that is a load balancer with the ip 172.168.200.10 and two web servers that are responding to requests, server1 172.168.200.2 and server2 172.168.200.3&lt;/P&gt;&lt;P&gt;The problem i have is that i am able to access the public ip of my load balancer from any host on the internet and it works normally but i am unable to get server1 and server2 to reach the internet.&lt;/P&gt;&lt;P&gt;I am sure this is a Natting problem but i can't find the solution.&lt;/P&gt;&lt;P&gt;I am attaching the configuration and a drawing of the network&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471694#M238135</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2019-03-12T04:14:57Z</dc:date>
    </item>
    <item>
      <title>Have you run a packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471695#M238138</link>
      <description>&lt;P&gt;Have you run a packet tracer on the ASA? If not please run the following command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ tcp 172.168.200.10 12345 4.2.2.2 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ tcp 172.168.200.10 12345 4.2.2.2 443 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Could you also post the output of the object group INTERNET-TCP and INTERNET-UDP&lt;/P&gt;&lt;P&gt;Also please check the logs when connecting to the internet from the servers, do you see anything that might be out of place?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 11:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471695#M238138</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-27T11:28:12Z</dc:date>
    </item>
    <item>
      <title>Load Balancer with the ip 172</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471696#M238142</link>
      <description>&lt;P&gt;Load Balancer with the ip 172.168.200.10 can access the internet since it has a static natting , the other two servers, server1 172.168.200.2 and server2 172.168.200.3 doesn't have a nat entry that's why they can't reach the internet. Basically what i want is to add a nat statement for those two servers also. If i use nat for the whole network 172.168.200.0/24 i am able to reach the internet from all servers but unable to get my load balancer work when i try to reach it using the public ip from outside.&lt;/P&gt;&lt;P&gt;You can see below the output for both 172.168.200.10 which has a static nat and works properly and below it the output for server1 172.168.200.2 which has not a nat statement and justifiably can't reach the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz tcp 172.168.200.10 12345 4.2.2.2 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ-IN in interface DMZ&lt;BR /&gt;access-list DMZ-IN extended permit tcp 172.168.200.0 255.255.255.0 any object-group INTERNET-TCP&lt;BR /&gt;object-group service INTERNET-TCP tcp&lt;BR /&gt;&amp;nbsp;description: TCP standard Internet Services&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;&amp;nbsp;port-object eq 62306&lt;BR /&gt;&amp;nbsp;port-object eq 60502&lt;BR /&gt;&amp;nbsp;port-object eq 58545&lt;BR /&gt;&amp;nbsp;port-object eq 445&lt;BR /&gt;&amp;nbsp;port-object eq 88&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq 135&lt;BR /&gt;&amp;nbsp;port-object eq 49155&lt;BR /&gt;&amp;nbsp;port-object eq 49159&lt;BR /&gt;&amp;nbsp;port-object eq 1433&lt;BR /&gt;&amp;nbsp;port-object eq 1434&lt;BR /&gt;&amp;nbsp;port-object eq 55527&lt;BR /&gt;&amp;nbsp;port-object eq 2794&lt;BR /&gt;&amp;nbsp;port-object eq 5985&lt;BR /&gt;&amp;nbsp;port-object eq 22233&lt;BR /&gt;&amp;nbsp;port-object eq 309&lt;BR /&gt;&amp;nbsp;port-object eq 902&lt;BR /&gt;&amp;nbsp;port-object eq 32843&lt;BR /&gt;&amp;nbsp;port-object eq 32844&lt;BR /&gt;&amp;nbsp;port-object eq 808&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,outside) source static WEBSERVER-REALIP WEBSERVER-PUBLICIP&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.168.200.10/12345 to A.B.C.D/12345&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,outside) source static WEBSERVER-REALIP WEBSERVER-PUBLICIP&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1697859, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------&lt;/P&gt;&lt;P&gt;asa# packet-tracer input dmz tcp 172.168.200.2 12345 4.2.2.2 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ-IN in interface DMZ&lt;BR /&gt;access-list DMZ-IN extended permit tcp 172.168.200.0 255.255.255.0 any object-group INTERNET-TCP&lt;BR /&gt;object-group service INTERNET-TCP tcp&lt;BR /&gt;&amp;nbsp;description: TCP standard Internet Services&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;&amp;nbsp;port-object eq 62306&lt;BR /&gt;&amp;nbsp;port-object eq 60502&lt;BR /&gt;&amp;nbsp;port-object eq 58545&lt;BR /&gt;&amp;nbsp;port-object eq 445&lt;BR /&gt;&amp;nbsp;port-object eq 88&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq 135&lt;BR /&gt;&amp;nbsp;port-object eq 49155&lt;BR /&gt;&amp;nbsp;port-object eq 49159&lt;BR /&gt;&amp;nbsp;port-object eq 1433&lt;BR /&gt;&amp;nbsp;port-object eq 1434&lt;BR /&gt;&amp;nbsp;port-object eq 55527&lt;BR /&gt;&amp;nbsp;port-object eq 2794&lt;BR /&gt;&amp;nbsp;port-object eq 5985&lt;BR /&gt;&amp;nbsp;port-object eq 22233&lt;BR /&gt;&amp;nbsp;port-object eq 309&lt;BR /&gt;&amp;nbsp;port-object eq 902&lt;BR /&gt;&amp;nbsp;port-object eq 32843&lt;BR /&gt;&amp;nbsp;port-object eq 32844&lt;BR /&gt;&amp;nbsp;port-object eq 808&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1697818, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 13:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471696#M238142</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2014-05-27T13:26:58Z</dc:date>
    </item>
    <item>
      <title>Well, I would have though</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471697#M238145</link>
      <description>&lt;P&gt;Well, I would have though that you would be able to send outgoing traffic through the loadbalancer also.&lt;BR /&gt;But you could add a dynamic NAT for the 172.168 network.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;network object 172_168_200_0&lt;BR /&gt;&amp;nbsp; subnet 172.168.200.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; nat (DMZ,outside) dynamic interface&lt;BR /&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 13:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471697#M238145</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-27T13:38:06Z</dc:date>
    </item>
    <item>
      <title>Thanks for your help</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471698#M238150</link>
      <description>&lt;P&gt;Thanks for your help&amp;nbsp;MariusGunnerud i am able to access the internet from those servers too.&lt;/P&gt;&lt;P&gt;The problem now is that they access the internet from the public ip assigned on the outside interface and not the dedicated ip address assigned for the load balancer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;isn't it possible to also add those two servers in the static nat statement and receive the ip of the load balancer?&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2014 13:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471698#M238150</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2014-05-27T13:51:06Z</dc:date>
    </item>
    <item>
      <title>Thanks for your help</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471699#M238152</link>
      <description>&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Thanks for your help&amp;nbsp;MariusGunnerud i am able to access the internet from those servers too.&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;The problem now is that they access the internet from the public ip assigned on the outside interface and not the dedicated ip address assigned for the load balancer.&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;isn't it possible to also add those two servers in the static nat statement and receive the ip of the load balancer?&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 06:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471699#M238152</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2014-05-28T06:00:29Z</dc:date>
    </item>
    <item>
      <title>You could use an object-group</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471700#M238154</link>
      <description>&lt;P&gt;You could use an object-group to group those 3 servers together...so something like this:&lt;BR /&gt;&lt;STRONG&gt;object-group network WEBSERVERS-PRIVATEIP&lt;BR /&gt;&amp;nbsp; host 172.168.200.10&lt;BR /&gt;&amp;nbsp; host 172.168.200.2&lt;BR /&gt;&amp;nbsp; host 172.168.200.3&lt;BR /&gt;nat (DMZ,outside) source static WEBSERVERS-PRIVATEIP WEBSERVER-PUBLICIP&lt;/STRONG&gt;&lt;BR /&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 06:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471700#M238154</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-28T06:52:00Z</dc:date>
    </item>
    <item>
      <title>Thank you for the rating :)</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471701#M238155</link>
      <description>&lt;P&gt;Thank you for the rating &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 07:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471701#M238155</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-05-28T07:26:26Z</dc:date>
    </item>
    <item>
      <title>Thanks for your help! :)</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471702#M238156</link>
      <description>&lt;P&gt;Thanks for your help! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 08:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-asa-5505-version-9-1/m-p/2471702#M238156</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2014-05-28T08:16:16Z</dc:date>
    </item>
  </channel>
</rss>

