<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cisco asa 5505 issues ( ROUTING AND PAT) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366174#M270884</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excellent tips.Thank you very much. Probably will use non ACL tip on live deploy. Anyway. One more time BIG THANKS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Jan 2014 12:23:34 GMT</pubDate>
    <dc:creator>ziggyrosalsky</dc:creator>
    <dc:date>2014-01-29T12:23:34Z</dc:date>
    <item>
      <title>cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366160#M270861</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I have some issues with my cisco asa 5505 config. Please see details below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NETWORK SETUP:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gateway( 192.168.223.191)&amp;nbsp;&amp;nbsp; - cisco asa 5505 ( outside - 192.168.223.200 , inside - 192.168.2.253, DMZ - 172.16.3.253 )&amp;nbsp; -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ISSUES:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;no route from DMZ to outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ping from 172.16.3201 to the gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Jan 27 2014&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;11:15:33&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;172.16.3.201&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;39728&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Failed to locate egress interface for ICMP from outside:172.16.3.201/39728 to 172.16.3.253/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;not working access from external to DMZ AT ALL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA DETAILS:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;cisco asa5505&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Device license&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Base &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;perpetual&lt;/P&gt;&lt;P&gt;VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ Restricted &lt;/P&gt;&lt;P&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;perpetual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall200(config)# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA Version 9.1(3) &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname firewall200&lt;/P&gt;&lt;P&gt;domain-name test1.com&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan100&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.223.200 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; mac-address 001b.539c.597e&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.2.253 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan300&lt;/P&gt;&lt;P&gt; no forward interface Vlan200&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.3.253 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa913-k8.bin&lt;/P&gt;&lt;P&gt;boot config disk0:/startup-config.cfg&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone GMT/BST 0&lt;/P&gt;&lt;P&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test1.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network office1-int&lt;/P&gt;&lt;P&gt; host 172.16.2.1&lt;/P&gt;&lt;P&gt;object network firewall-dmz-gateway&lt;/P&gt;&lt;P&gt; host 172.16.3.253&lt;/P&gt;&lt;P&gt;object network firewall-internal-gateway&lt;/P&gt;&lt;P&gt; host 172.16.2.253&lt;/P&gt;&lt;P&gt;object network com1&lt;/P&gt;&lt;P&gt; host 192.168.223.227&lt;/P&gt;&lt;P&gt;object network web2-ext&lt;/P&gt;&lt;P&gt; host 192.168.223.201&lt;/P&gt;&lt;P&gt;object network web2-int&lt;/P&gt;&lt;P&gt; host 172.16.3.201&lt;/P&gt;&lt;P&gt;object network gateway&lt;/P&gt;&lt;P&gt; host 192.168.223.191&lt;/P&gt;&lt;P&gt;object network office1-int&lt;/P&gt;&lt;P&gt; host 172.16.2.1&lt;/P&gt;&lt;P&gt;object-group network DMZ_SUBNET&lt;/P&gt;&lt;P&gt; network-object 172.16.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service www tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object web2-ext eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&amp;nbsp; &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-714.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp DMZ 172.16.4.199 001b.539c.597e alias&lt;/P&gt;&lt;P&gt;arp DMZ 172.16.3.199 001b.539c.597e alias&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network web2-int&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,outside) static web2-ext service tcp www www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group DMZ_access_in in interface DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 172.168.2.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 172.168.3.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.223.227 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 172.163.2.5 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 172.163.2.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.223.227 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh 172.163.2.5 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh 172.163.2.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.2.10-172.16.2.10 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 176.58.109.199 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 81.150.197.169 source outside&lt;/P&gt;&lt;P&gt;ntp server 82.113.154.206&lt;/P&gt;&lt;P&gt;username xxxx password xxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map DMZ-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;policy-map DMZ-policy&lt;/P&gt;&lt;P&gt; class DMZ-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy DMZ-policy interface DMZ&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:9c73fa27927822d24c75c49f09c67c24&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366160#M270861</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2019-03-12T03:36:22Z</dc:date>
    </item>
    <item>
      <title>cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366161#M270865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;added:&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.223.191 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;still no luck &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 13:34:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366161#M270865</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2014-01-27T13:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366162#M270868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets look at your interface configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 192.168.223.200 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; mac-address 001b.539c.597e&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 172.16.2.253 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan300&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; no forward interface Vlan200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 172.16.3.253 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see the networks 172.16.2.0/24 and 172.16.3.0/24 are directly connected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are these routes supposed to be?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 172.168.2.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 172.168.3.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are routes for networks which are both directly connected (and dont need static routes) and routed towards interface with a default gateway IP address that does not belong to that interface (belongs to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you should not see the ICMP coming from the&lt;STRONG&gt; "outside"&lt;/STRONG&gt; interface if your host is connected to the DMZ Vlan of 300 and is trying to send ICMP to its ASA gateway interface IP address of 172.16.3.253.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 13:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366162#M270868</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-27T13:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366163#M270869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL for the external inteface is using the wrong destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the new ASA software the NAT is done before ACL so you will actually have to allow the traffic to the real/local IP address rather then the NAT IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need this rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object web2-int eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 13:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366163#M270869</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-27T13:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366164#M270871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the quick respond.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wanted to create 3 vlans - external internal and dmz&amp;nbsp; . simple pat to dmz ( ssh,web ) , internal to lan,dmz (ssh,web) , no access from dmz to internal of course ( licence restriction ) .that's it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was thinking that by adding those routes will achieve acccess from internal and dmz threw outside (192.168.223.200) to external gateway 192.168.223.191&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 172.168.2.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route DMZ 172.168.3.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;about nat I updated it and now have :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object web2-int eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object web2-int eq ssh &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(still can't access web2-int from com1 - neither www nor ssh )&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 14:08:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366164#M270871</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2014-01-27T14:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366165#M270873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to have both networks directly connected to the ASA. Therefore the ASA sees them directly in its routing table and doesnt need any additional routes configured for the networks. You only need the default route. No routes are needed for the directly connected networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can confirm the rule from the external network with this command for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 192.168.223.201 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should tell if there is some problems with the ASA configurations or if the problem is perhaps somewhere else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also suggest checking the ARP table of the ASA. As the DMZ server network is directly connected to the ASA this means that the ASA should see the server directly if its connected behind the DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Share the output of both commands here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 14:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366165#M270873</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-27T14:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366166#M270875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so from what you're saying i should do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remove those :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route inside 172.168.2.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route DMZ 172.168.3.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and leave only :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 192.168.223$&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network web2-int&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) static web2-ext net-to-net&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface DMZ&lt;/P&gt;&lt;P&gt;Untranslate 192.168.223.201/80 to 172.16.3.201/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: DMZ&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="font-size: 10pt;"&gt;show arp&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside 192.168.223.191 001d.aaaa.66b0 40&lt;/P&gt;&lt;P&gt; outside 192.168.223.227 10dd.b1b6.2a96 288&lt;/P&gt;&lt;P&gt; DMZ 172.16.3.201 000c.2916.5432 8048&lt;/P&gt;&lt;P&gt; DMZ 172.16.4.199 001b.539c.597e alias -&lt;/P&gt;&lt;P&gt; DMZ 172.16.3.199 001b.539c.597e alias -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 14:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366166#M270875</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2014-01-27T14:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366167#M270877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont need the routes since they are directly connected networks and the ASA wont use them. Furthermore they cant work since they are pointing to an invalid gateway IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you can remove the routes you mentioned&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route inside 172.168.2.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route DMZ 172.168.3.0 255.255.255.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems that the ASA can see the DMZ servers local IP address/MAC correctly. Though you could still check with ICMP from the ASA to the DMZ host for which you are attempting connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping 172.16.3.201&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also test the port on the host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping tcp 172.16.3.201 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to have some problems with the ACL for some reason. Your configuration must have changed from the original one posted since this shows it being blocked. Seems that the ACL might not be attached to the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Actually the routes above seem to be for different networks than the connected ones. Just looking that they start with 172.168. instead of 172.16. Those routes are actually for public networks since they dont fit to the private IP address range. Though the fact still remains that they can not be valid routes when they are pointing to an IP address that is not in that interfaces subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jouni Forss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 14:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366167#M270877</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-27T14:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366168#M270878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you're right !!!.managed to lost &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;readded&lt;/P&gt;&lt;P&gt;sorry for confusion:&lt;/P&gt;&lt;P&gt;here are updated results&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 192.168.223.201 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network web2-int&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) static web2-ext net-to-net&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface DMZ&lt;/P&gt;&lt;P&gt;Untranslate 192.168.223.201/80 to 172.16.3.201/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object web2-int eq www &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map DMZ-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;policy-map DMZ-policy&lt;/P&gt;&lt;P&gt; class DMZ-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;service-policy DMZ-policy interface DMZ&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network web2-int&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) static web2-ext net-to-net&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 484, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: DMZ&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall200(config)# &lt;STRONG&gt;ping tcp 172.16.3.201 80&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;No source specified. Pinging from identity interface.&lt;/P&gt;&lt;P&gt;Sending 5 TCP SYN requests to 172.16.3.201 port 80&lt;/P&gt;&lt;P&gt;from 172.16.3.253, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?!???&lt;/P&gt;&lt;P&gt;Success rate is 20 percent (1/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall200(config)# &lt;STRONG&gt;ping 172.16.3.201&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 172.16.3.201, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?!!!!&lt;/P&gt;&lt;P&gt;Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 15:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366168#M270878</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2014-01-27T15:01:36Z</dc:date>
    </item>
    <item>
      <title>cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366169#M270879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; test seems to indicate that the ASA configuration are ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its however wierd that your server only replys to one TCP SYN and also partly to the ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should check the servers connectivity to the network. This doesnt seem to be a problem with the ASA configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jan 2014 15:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366169#M270879</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-27T15:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366170#M270880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you one more time for everthing. It is workingin indeed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Reason why maybe sometimes I had some 'weird' results was because I had all devices connected to the same switch.Separtated all networks to a different switches helped.Anyway if you could take a look one last time to my configuration and let me know if it's good enough to deploy it on live ( only www for all , ssh restricted from outside, lan to dmz) .Thanks one more time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname firewall200&lt;/P&gt;&lt;P&gt;domain-name test1.com&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 300&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan100&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.223.200 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; mac-address 001b.539c.597e&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.2.253 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan300&lt;/P&gt;&lt;P&gt; no forward interface Vlan200&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.3.253 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa913-k8.bin&lt;/P&gt;&lt;P&gt;boot config disk0:/startup-config.cfg&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone GMT/BST 0&lt;/P&gt;&lt;P&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup DMZ&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 8.8.4.4&lt;/P&gt;&lt;P&gt; domain-name test1.com&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network firewall-dmz-gateway&lt;/P&gt;&lt;P&gt; host 172.16.3.253&lt;/P&gt;&lt;P&gt;object network firewall-internal-gateway&lt;/P&gt;&lt;P&gt; host 172.16.2.253&lt;/P&gt;&lt;P&gt;object network com1&lt;/P&gt;&lt;P&gt; host 192.168.223.227&lt;/P&gt;&lt;P&gt;object network web2-ext&lt;/P&gt;&lt;P&gt; host 192.168.223.201&lt;/P&gt;&lt;P&gt;object network web2-int&lt;/P&gt;&lt;P&gt; host 172.16.3.201&lt;/P&gt;&lt;P&gt;object network gateway&lt;/P&gt;&lt;P&gt; host 192.168.223.191&lt;/P&gt;&lt;P&gt;object network office1-int&lt;/P&gt;&lt;P&gt; host 172.16.2.1&lt;/P&gt;&lt;P&gt;object-group network DMZ_SUBNET&lt;/P&gt;&lt;P&gt; network-object 172.16.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service www tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit icmp any any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit ip any any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp 172.16.3.0 255.255.255.0 interface outside eq ssh &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object web2-int eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object web2-int eq ssh &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-714.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp DMZ 172.16.4.199 001b.539c.597e alias&lt;/P&gt;&lt;P&gt;arp DMZ 172.16.3.199 001b.539c.597e alias&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network web2-int&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,outside) static web2-ext net-to-net&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group DMZ_access_in in interface DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 192.168.223.191 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.223.227 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 172.163.2.5 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 172.163.2.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 192.168.223.227 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.163.2.5 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.16.3.253 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.163.2.5 255.255.255.255 inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 176.58.109.199 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 81.150.197.169 source outside&lt;/P&gt;&lt;P&gt;ntp server 82.113.154.206&lt;/P&gt;&lt;P&gt;username xxxxx password xxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map DMZ-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;policy-map DMZ-policy&lt;/P&gt;&lt;P&gt; class DMZ-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy DMZ-policy interface DMZ&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:f264c94bb8c0dd206385a6b72afe9e5b&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jan 2014 08:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366170#M270880</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2014-01-28T08:28:16Z</dc:date>
    </item>
    <item>
      <title>cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366171#M270881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How will the setup change when you move it to a live network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you going to place this ASA on the edge of the network and use public IP addresses on the ASAs &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface or will the ASA be behind another NAT device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wondering as you at the moment have Static NAT configured for your host but rest of your internal LAN and DMZ networks hosts done have any NAT configured. In other words if you connected this to some network the traffic from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; would show up with their original IP address to any device in front of the ASA. (while the single server would show up with the Static NAT IP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently it seems to me that you have allowed all traffic from LAN and DMZ to the WAN (external network). Connections from DMZ to LAN are naturally denied do to the limitation of the license and the &lt;STRONG&gt;"no forward interface vlan200"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The settings you have for the SSH management of the ASA seem a bit wierd also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 192.168.223.227 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.163.2.5 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.16.3.253 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.163.2.5 255.255.255.255 inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first command makes sense as it contains as source address an IP address from the connected network. The second command looks like it has a typo perhaps as it contains an address 172.163.2.5? The third command also seems to be wrong as it contains an IP address located behind &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; but the command has been set to allow SSH management from this IP address from behind &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. The last command makes sense as it contains an IP address from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please so remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jan 2014 08:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366171#M270881</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-28T08:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366172#M270882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yeap it will be put on the edge of the internet with public IP for a firewall and&lt;/P&gt;&lt;P&gt;31 other public ip addresses to use in PAT rules (most of them will be used in DMZ, few in inside zone)&lt;/P&gt;&lt;P&gt;I’ll multiple this nat rule to achieve that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network web2-int&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ,outside) static web2-ext net-to-net&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;About the traffic from inside and DMZ &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;I was thinking about removing &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and leave:&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit icmp any any&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp 172.16.3.0 255.255.255.0 interface outside eq ssh &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp 172.16.3.0 255.255.255.0 interface outside eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp 172.16.3.0 255.255.255.0 interface outside eq https &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; INSIDE:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit icmp any any&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit tcp 172.16.3.0 255.255.255.0 interface outside eq ssh &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit tcp 172.16.3.0 255.255.255.0 interface outside eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit tcp 172.16.3.0 255.255.255.0 interface outside eq https &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it should allow only ssh, http, https and ping isn’t?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for spotting the mess in ssh access area &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; it’s sorted out now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some weird issue with ASDM from DMZ&lt;/P&gt;&lt;P&gt;have this rule but it still keep blocking it&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http 172.163.3.200 255.255.255.255 DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ssh access is OK&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.16.3.200 255.255.255.255 DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jan 2014 14:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366172#M270882</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2014-01-28T14:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366173#M270883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was asking about the actual live setup just to confirm what is needed for the NAT. As you mention that the device is going to be at the edge of the network, notice that the device will need a Dynamic PAT configuration that provides the internal hosts (which dont have Static NAT) their public IP address for Internet connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest adding this configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Dynamic PAT Source Networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 172.16.2.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 172.16.3.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source dynamic PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This configuration will essentially define the source networks on the LAN/DMZ for the Dynamic PAT translation inside &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; and will then use the &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; in the actual &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command. This should handle Dynamic PAT for both the LAN and DMZ so any host there will have a translation on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to your ACL rules you will have to notice that you are missing one essential service/port from that list (IF you are not permitting all traffic). This is DNS which uses UDP/53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would perhaps consider allowing traffic/connections more freely from the LAN network behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface and perhaps limiting the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; networks outbound connections. Notice that you will not have to take into account the DMZ to LAN traffic in the DMZ ACL since that traffic is already otherwise blocked as I mentioned before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice also that both of your ACLs have the same source network which is the DMZ network. Your &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interfaces ACL should naturally have the network 172.16.2.0/24 as the source. Also both ACLs allow traffic to interface&lt;STRONG&gt; "outside".&lt;/STRONG&gt; This does NOT mean that the traffic will be allowed to any network behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. You need to allow the traffic to destination &lt;STRONG&gt;"any".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit icmp any any&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp 172.16.3.0 255.255.255.0 any eq ssh &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp 172.16.3.0 255.255.255.0 any eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ_access_in extended permit tcp 172.16.3.0 255.255.255.0 any eq https &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;access-list DMZ_access_in extended permit udp 172.16.3.0 255.255.255.0 any eq domain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit icmp any any&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit tcp 172.16.2.0 255.255.255.0 any eq ssh &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit tcp 172.16.2.0 255.255.255.0 any eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit tcp 172.16.2.0 255.255.255.0 any eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit udp 172.16.2.0 255.255.255.0 any eq domain&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said, I would consider allow traffic more freely from behind the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface. You might be using other services too like FTP or SMTP and others that would get blocked with the above ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If youre requirement was just as simple as allowing traffic the following way&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;LAN -&amp;gt; DMZ&lt;/LI&gt;&lt;LI&gt;LAN -&amp;gt; WAN&lt;/LI&gt;&lt;LI&gt;DMZ -&amp;gt; WAN&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you could simply leave &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"DMZ" &lt;/STRONG&gt;without ACLs and just use the&lt;STRONG&gt; "outside"&lt;/STRONG&gt; interface ACL to allow traffic to your servers for the services you require. Leaving the mentioned ACLs off would mean that the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value would determine where connections could form. As its from higher to lower that would mean the above requirements would be filled. If you need to deny some services but allow the rest then you naturally require ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the ASDM allowing configuration there is still a typo there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http 172.163.3.200 255.255.255.255 DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that the source address is wrong. Its 172.163.3.200 when its supposed to be 172.16.3.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jan 2014 16:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366173#M270883</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-28T16:16:17Z</dc:date>
    </item>
    <item>
      <title>cisco asa 5505 issues ( ROUTING AND PAT)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366174#M270884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excellent tips.Thank you very much. Probably will use non ACL tip on live deploy. Anyway. One more time BIG THANKS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 12:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-issues-routing-and-pat/m-p/2366174#M270884</guid>
      <dc:creator>ziggyrosalsky</dc:creator>
      <dc:date>2014-01-29T12:23:34Z</dc:date>
    </item>
  </channel>
</rss>

