<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 9.1 - static NAT problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360106#M306595</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I wanted to create a static NAT by following Cisco's documentation for ASA 9.1 firmware. Inside network is using PAT without any issues but&amp;nbsp; ASA is not doing NAT for some internal servers from outside. I tried to troubleshoot but I have nothing else left to check. Can you please look at my config and let me knnow if there is anything wrong? I am trying to use permit all ACL until my config works. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multicast-routing&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.5 255.255.255.252&lt;/P&gt;&lt;P&gt; ospf message-digest-key 1 md5 *****&lt;/P&gt;&lt;P&gt; ospf authentication message-digest&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.4.18.194 255.255.255.192&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa914-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name net&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network WEB&lt;/P&gt;&lt;P&gt; host 10.100.2.104&lt;/P&gt;&lt;P&gt;object network RAS&lt;/P&gt;&lt;P&gt; host 10.100.99.2&lt;/P&gt;&lt;P&gt;object network box&lt;/P&gt;&lt;P&gt; host 10.120.1.201&lt;/P&gt;&lt;P&gt;object network inside_network&lt;/P&gt;&lt;P&gt; subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit gre any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;mtu OUTSIDE 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface OUTSIDE&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-715.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network WEB&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static 1.4.18.195&lt;/P&gt;&lt;P&gt;object network RAS&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static 1.4.18.196&lt;/P&gt;&lt;P&gt;object network box&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static 1.4.18.198&lt;/P&gt;&lt;P&gt;object network inside_network&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 10&lt;/P&gt;&lt;P&gt; router-id 10.10.1.5&lt;/P&gt;&lt;P&gt; network 10.10.1.4 255.255.255.252 area 0&lt;/P&gt;&lt;P&gt; log-adj-changes&lt;/P&gt;&lt;P&gt; default-information originate metric 95&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tls-proxy maximum-session 1000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect mgcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:22:39 GMT</pubDate>
    <dc:creator>1johnsmith</dc:creator>
    <dc:date>2019-03-12T03:22:39Z</dc:date>
    <item>
      <title>ASA 9.1 - static NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360106#M306595</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I wanted to create a static NAT by following Cisco's documentation for ASA 9.1 firmware. Inside network is using PAT without any issues but&amp;nbsp; ASA is not doing NAT for some internal servers from outside. I tried to troubleshoot but I have nothing else left to check. Can you please look at my config and let me knnow if there is anything wrong? I am trying to use permit all ACL until my config works. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multicast-routing&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.5 255.255.255.252&lt;/P&gt;&lt;P&gt; ospf message-digest-key 1 md5 *****&lt;/P&gt;&lt;P&gt; ospf authentication message-digest&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.4.18.194 255.255.255.192&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa914-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name net&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network WEB&lt;/P&gt;&lt;P&gt; host 10.100.2.104&lt;/P&gt;&lt;P&gt;object network RAS&lt;/P&gt;&lt;P&gt; host 10.100.99.2&lt;/P&gt;&lt;P&gt;object network box&lt;/P&gt;&lt;P&gt; host 10.120.1.201&lt;/P&gt;&lt;P&gt;object network inside_network&lt;/P&gt;&lt;P&gt; subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit gre any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;mtu OUTSIDE 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface OUTSIDE&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-715.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network WEB&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static 1.4.18.195&lt;/P&gt;&lt;P&gt;object network RAS&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static 1.4.18.196&lt;/P&gt;&lt;P&gt;object network box&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static 1.4.18.198&lt;/P&gt;&lt;P&gt;object network inside_network&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 10&lt;/P&gt;&lt;P&gt; router-id 10.10.1.5&lt;/P&gt;&lt;P&gt; network 10.10.1.4 255.255.255.252 area 0&lt;/P&gt;&lt;P&gt; log-adj-changes&lt;/P&gt;&lt;P&gt; default-information originate metric 95&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tls-proxy maximum-session 1000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect mgcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360106#M306595</guid>
      <dc:creator>1johnsmith</dc:creator>
      <dc:date>2019-03-12T03:22:39Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 - static NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360107#M306596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would start with testing the NAT that is not working with &lt;STRONG&gt;"packet-tracer" &lt;/STRONG&gt;command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Simulate/Test some connection coming from the public network with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input OUTSIDE tcp 1.1.1.1 12345 &lt;PUBLIC nat="" ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You did not mention the Static NAT that is not working (unless the problem is with all of them) so insert the correct NAT IP to the above command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a default route configured on the ASA at all? I can't see it in the above output atleast. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you checked the ASAs routing table? Does it include the source address of the Static NAT that is working? Just wondering if there is a routing problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Dec 2013 16:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360107#M306596</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-28T16:38:57Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 - static NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360108#M306597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;yes there is a static route (it is deleted from the config posted by accident) pointing to the outside interface.&lt;/P&gt;&lt;P&gt;Problem is with all of Static NAT entries. I do not have any issues with any internal routing and I can easily ping my outside gateway. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try packet-tracer and see what it shows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Dec 2013 05:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360108#M306597</guid>
      <dc:creator>1johnsmith</dc:creator>
      <dc:date>2013-12-29T05:23:42Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 - static NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360109#M306598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your internal servers are reachable on a particular port? For instance 80/443?&lt;/P&gt;&lt;P&gt;The NAT statements are fine to me, very basic.&lt;/P&gt;&lt;P&gt;Your access-list is wide open, no problem either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try from another internetconnection to telnet to one of your public IP-adresses on a open port 80/443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Posted by WebUser &lt;A href="http://www.facebook.com/profile.php?id=100002677647017"&gt;Erik Boss &lt;/A&gt; from &lt;A href="http://apps.facebook.com/ciscosupport/"&gt;Cisco Support Community App &lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Dec 2013 13:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360109#M306598</guid>
      <dc:creator>fb_webuser</dc:creator>
      <dc:date>2013-12-29T13:57:34Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 - static NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360110#M306599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;yes my internal servers are reachable, I do not have any other firewall on the servers blocking those ports. I do not think I have any routing or firewall problem. I do not know what I am missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Dec 2013 04:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360110#M306599</guid>
      <dc:creator>1johnsmith</dc:creator>
      <dc:date>2013-12-30T04:26:09Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 - static NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360111#M306602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've found out after checking with packet tracer, it looks like inbound connection is failing because of rpf-check. how can I make sure that return traffic from servers follow back their original NAT connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 16:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360111#M306602</guid>
      <dc:creator>1johnsmith</dc:creator>
      <dc:date>2013-12-31T16:16:40Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 - static NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360112#M306603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most common reason that the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; might fail with the RPF Check is if you use the actual private IP address as the destination in the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That or some problems with the NAT configurations but that doesnt seem likely considering your simple NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would still help to see the actual &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output I suggested originally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be seeing an &lt;STRONG&gt;UN-NAT Phase&lt;/STRONG&gt; at the very start of the output which would tell the destination address of the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; matches one of your NAT configurations. Then you should see a &lt;STRONG&gt;ACCESS-LIST Phase&lt;/STRONG&gt; which shows an interface ACL allowing the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 22:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-static-nat-problem/m-p/2360112#M306603</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-31T22:28:56Z</dc:date>
    </item>
  </channel>
</rss>

