<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The output requested is below in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467924#M267281</link>
    <description>&lt;P&gt;The output requested is below. &amp;nbsp;As you can see in the portion I've shown in red, the step hits the NAT translation rule, but then does not translate. &amp;nbsp;I have injected traffic from the b2b_dmz into the inside and that IS successfully translated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show xlate | i 192.168.165.162&lt;BR /&gt;NAT from inside:192.168.165.162 to b2b_dmz:199.67.6.170&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer in inside tcp 192.168.165.162 5000 9.9.9.9 $&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface b2b_dmz&lt;BR /&gt;Untranslate 9.9.9.9/1414 to 9.9.9.9/1414&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_in in interface inside&lt;BR /&gt;access-list inside_in extended permit tcp object-group plexuat gt 1023 object-group chase_uat range 1414 1416&lt;BR /&gt;object-group network plexuat&lt;BR /&gt;&amp;nbsp;network-object object PlexT1&lt;BR /&gt;&amp;nbsp;network-object object ST1A&lt;BR /&gt;&amp;nbsp;network-object object ST1B&lt;BR /&gt;object-group network chase_uat&lt;BR /&gt;&amp;nbsp;network-object host 9.9.9.9&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f05ac88, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=548, user_data=0x36d58f00, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=192.168.165.162, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=9.9.9.9, mask=255.255.255.255, port=0,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sport range&amp;lt;0&amp;gt; : 1024-65535 dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f43fee8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=113255489, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f57eb88, priority=20, domain=lu, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=34248324, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#FF0000;"&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,b2b_dmz) source static ST1A ST1A_nat&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f5f0f08, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=21, user_data=0x3f04f4b8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=192.168.165.162, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=b2b_dmz&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x3fe91f10, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=163205836, user_data=0x3fe91d20, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f3aa0e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=235905, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=b2b_dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 163340236, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: b2b_dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
    <pubDate>Mon, 28 Apr 2014 20:27:24 GMT</pubDate>
    <dc:creator>montgomerywr</dc:creator>
    <dc:date>2014-04-28T20:27:24Z</dc:date>
    <item>
      <title>NAT Translation Issue on ASA5580</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467922#M267279</link>
      <description>&lt;P&gt;ASA5580 running 8.3(1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I have a NAT translation issue that I've been banging my head against for a couple of days now. &amp;nbsp;I have an internal server that needs to pass through our ASA firewall and then get's routed to a B2B partner's routers (local in our data center). &amp;nbsp;At that point the partner has a VPN established to send the traffic to it's final destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the following configuration:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;object network server&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 192.168.165.162&lt;BR /&gt;object network server_nat&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 199.67.6.170&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;nat (inside,b2b_dmz) source static server server_nat&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;access-list inside_in extended permit tcp host 192.168.165.162 gt 1023 host 9.9.9.9 range 1414 1416 (hitcnt=123)&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the traffic is initiated from the internal server, it hits the firewall rule and is allowed. &amp;nbsp;From my understanding, at that time, the internal server IP should be NAT'd to the external IP. &amp;nbsp;However, if I do a "show nat" command, I do not see any translate_hits.&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;1 (inside) to (b2b_dmz) source static server server_nat&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467922#M267279</guid>
      <dc:creator>montgomerywr</dc:creator>
      <dc:date>2019-03-12T04:07:28Z</dc:date>
    </item>
    <item>
      <title>please provide the output of</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467923#M267280</link>
      <description>&lt;P&gt;please provide the output of the following commands:&lt;/P&gt;&lt;P&gt;sh xlate | i 192.168.165.162&lt;/P&gt;&lt;P&gt;packet in inside tcp 192.168.165.162 1025 9.9.9.9 1414&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 21:48:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467923#M267280</guid>
      <dc:creator>joseoroz</dc:creator>
      <dc:date>2014-04-25T21:48:22Z</dc:date>
    </item>
    <item>
      <title>The output requested is below</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467924#M267281</link>
      <description>&lt;P&gt;The output requested is below. &amp;nbsp;As you can see in the portion I've shown in red, the step hits the NAT translation rule, but then does not translate. &amp;nbsp;I have injected traffic from the b2b_dmz into the inside and that IS successfully translated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show xlate | i 192.168.165.162&lt;BR /&gt;NAT from inside:192.168.165.162 to b2b_dmz:199.67.6.170&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer in inside tcp 192.168.165.162 5000 9.9.9.9 $&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface b2b_dmz&lt;BR /&gt;Untranslate 9.9.9.9/1414 to 9.9.9.9/1414&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_in in interface inside&lt;BR /&gt;access-list inside_in extended permit tcp object-group plexuat gt 1023 object-group chase_uat range 1414 1416&lt;BR /&gt;object-group network plexuat&lt;BR /&gt;&amp;nbsp;network-object object PlexT1&lt;BR /&gt;&amp;nbsp;network-object object ST1A&lt;BR /&gt;&amp;nbsp;network-object object ST1B&lt;BR /&gt;object-group network chase_uat&lt;BR /&gt;&amp;nbsp;network-object host 9.9.9.9&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f05ac88, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=548, user_data=0x36d58f00, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=192.168.165.162, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=9.9.9.9, mask=255.255.255.255, port=0,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; sport range&amp;lt;0&amp;gt; : 1024-65535 dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f43fee8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=113255489, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f57eb88, priority=20, domain=lu, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=34248324, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#FF0000;"&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,b2b_dmz) source static ST1A ST1A_nat&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f5f0f08, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=21, user_data=0x3f04f4b8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=192.168.165.162, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=b2b_dmz&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x3fe91f10, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=163205836, user_data=0x3fe91d20, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x3f3aa0e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=235905, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=b2b_dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 163340236, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: b2b_dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Mon, 28 Apr 2014 20:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467924#M267281</guid>
      <dc:creator>montgomerywr</dc:creator>
      <dc:date>2014-04-28T20:27:24Z</dc:date>
    </item>
    <item>
      <title>Do you have any rules with a</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467925#M267282</link>
      <description>&lt;P&gt;Do you have any rules with a higher order # than&lt;/P&gt;&lt;P&gt;nat (inside,b2b_dmz) source static server server_nat?&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh run nat will list your rules, look for a rule that is on top of the one you created for this traffic.&amp;nbsp; If so, try adding&lt;/P&gt;&lt;P&gt;nat (inside,b2b_dmz) 1 source static server server_nat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Apr 2014 20:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467925#M267282</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2014-04-28T20:46:39Z</dc:date>
    </item>
    <item>
      <title>Have you tried configuring</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467926#M267284</link>
      <description>&lt;P&gt;Have you tried configuring the nat under the auto-nat and not under manual nat?&amp;nbsp; I have experience issues in the past of a similar nature when trying to do something similar with manual nat.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network server_nat&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 199.67.6.170&lt;/P&gt;&lt;P&gt;object network server&lt;BR /&gt;&amp;nbsp;&amp;nbsp; host 192.168.165.162&lt;BR /&gt;&amp;nbsp;&amp;nbsp; nat (inside,b2b_dmz) static server_nat&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 10:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467926#M267284</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-29T10:48:39Z</dc:date>
    </item>
    <item>
      <title>Yes, when I originally</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467927#M267285</link>
      <description>&lt;P&gt;Yes, when I originally entered the NAT statement it was after an any,any statement, and I would see the any/any NAT statement hit in the packet-tracer. &amp;nbsp;The NAT statement is now the first statement (using the command as you've shown) and it's still not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you can see in the following step of the packet-tracer, it is hitting the correct NAT statement, but the NAT is not taking place:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;Phase: 5&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;Type: NAT&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;Subtype:&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;Config:&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;nat (inside,b2b_dmz) source static server server_nat&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;&amp;nbsp;in &amp;nbsp;id=0x3f5f0f08, priority=6, domain=nat, deny=false&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=21, user_data=0x3f04f4b8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=192.168.165.162, mask=255.255.255.255, port=0&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;BR style="color: rgb(255, 0, 0); font-size: 14px;" /&gt;&lt;SPAN style="color: rgb(255, 0, 0); font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=inside, output_ifc=b2b_dmz&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 13:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467927#M267285</guid>
      <dc:creator>montgomerywr</dc:creator>
      <dc:date>2014-04-29T13:53:50Z</dc:date>
    </item>
    <item>
      <title>Our firewall administrator</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467928#M267286</link>
      <description>&lt;P&gt;Our firewall administrator has an any,any static NAT at the end of the NAT list. &amp;nbsp;My understanding is that those manual entries are Section 1 &amp;amp; the auto-nat statements are Section 2. &amp;nbsp;Since any translation would match that any/any in Section 1, the auto-NAT would never be considered in Section 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that correct?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 13:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467928#M267286</guid>
      <dc:creator>montgomerywr</dc:creator>
      <dc:date>2014-04-29T13:56:35Z</dc:date>
    </item>
    <item>
      <title>How is it you're determining</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467929#M267287</link>
      <description>&lt;P&gt;How is it you're determining the NAT isn't taking place?&amp;nbsp; Based on your 2nd packet tracer, the NAT translation looks good.&amp;nbsp; Your initial packet tracker showed it getting NATed from &lt;SPAN style="color:#FF0000"&gt;ST1A to ST1A_nat&lt;/SPAN&gt;. This recent packet tracer show &lt;SPAN style="color:rgb(255, 0, 0); font-size:14px"&gt;server to server_nat&lt;/SPAN&gt;, which based on your object config will nat&amp;nbsp;192.168.165.162 to&amp;nbsp; 199.67.6.170 when that flow goes from the inside across your b2b_dmz interface.&amp;nbsp; If this is failing, it might be somewhere other than the NAT portion.&amp;nbsp; Have you run a packet capture downstream of your firewall to see if traffic from 199.67.6.170 is appearing?&amp;nbsp; Also, based on your packet tracer, I didn't see a route other than the default route being used.&amp;nbsp; You didn't include the routing section of the packet tracer.&amp;nbsp; If you're routing to public IPs across your b2b_dmz interface, make sure you add routes so that traffic doesn't use the default route out your outside interface.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 14:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467929#M267287</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2014-04-29T14:18:42Z</dc:date>
    </item>
    <item>
      <title>I'm determining that the NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467930#M267288</link>
      <description>&lt;P&gt;I'm determining that the NAT isn't happening from a multitude of sources:&lt;/P&gt;&lt;P&gt;First is the firewall log:&lt;/P&gt;&lt;P&gt;10&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;2014/04/29 09:22:35.057 CDT&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;172.17.65.20&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Apr 29 2014 09:22:35 hqpublicdmzfw : %ASA-6-302013: Built outbound TCP connection 163956188 for b2b_dmz:169.111.118.79/1414 (169.111.118.79/1414) to inside:192.168.165.163/1829 (&lt;SPAN style="color:#FF0000;"&gt;192.168.165.163/1829&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;From my experience, when an address is NAT'd it appears in the firewall log where I've highlighted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second is the fact that translate_hits are not incrementing when I use the show nat command:&lt;/P&gt;&lt;P&gt;hqpublicdmzfw# show nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (b2b_dmz) source static server server_nat&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly, I put an access-list &amp;amp; logged the results on a switch further down the path and have seen the traffic come from the un-NAT'd address.&lt;/P&gt;&lt;P&gt;The routing statement in the firewall is below &amp;amp; points to the L3 of the B2B distribution switch &amp;amp; is correctly routed with static routes from there to the partner's routers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route b2b_dmz 169.111.118.79 255.255.255.255 172.17.65.59 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for all your help. &amp;nbsp;It's really driving me crazy. &amp;nbsp;An interesting point to make is if I initiate the traffic from the b2b_dmz to inside, the public IP is translated to the private IP &amp;amp; the untranslate_hits increments.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 14:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467930#M267288</guid>
      <dc:creator>montgomerywr</dc:creator>
      <dc:date>2014-04-29T14:51:34Z</dc:date>
    </item>
    <item>
      <title>That is correct.As per the</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467931#M267289</link>
      <description>&lt;P&gt;That is correct.&lt;/P&gt;&lt;P&gt;As per the output of your show xlate command traffic is not being NATed correctly and it would seem that the traffic is hitting a different NAT statement.&lt;/P&gt;&lt;P&gt;Would you be able to post all your NAT statements so we help you troubleshoot further?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 07:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467931#M267289</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-30T07:03:04Z</dc:date>
    </item>
    <item>
      <title>Can you do me a favor an try</title>
      <link>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467932#M267290</link>
      <description>&lt;P&gt;Can you do me a favor an try to establish a connection from b2b_dmz to inside and print out the logs. You can do it with a packet tracer and check the real time log viewer on ASDM filtering the source address that you are using or do it via CLI if you know.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 21:44:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-translation-issue-on-asa5580/m-p/2467932#M267290</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2014-04-30T21:44:52Z</dc:date>
    </item>
  </channel>
</rss>

