<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: outside access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421909#M307720</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a minor mistake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 4 extended permit tcp host x.x.197.99 &lt;SPAN style="color: #ff0000;"&gt;eq www&lt;/SPAN&gt; host 192.168.1.11 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is that you define the source port as TCP/80 also (WWW/HTTP). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will not be the case. The clients source ports is pretty much always a random source port and you rarely know it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So change your ACL to this to allow both HTTP and HTTPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 4 extended permit tcp host x.x.197.99 host 192.168.1.11 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 5 extended permit tcp host x.x.197.99 host 192.168.1.11 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above simply allows destination port TCP/80 and TCP/443 connections from the single source IP address. As we dont mention any source port after the source IP address that means any source port is fine and this is how it should be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Dec 2013 20:54:25 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-12-04T20:54:25Z</dc:date>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421908#M307719</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;I am having a beat my head against the wall moment.&amp;nbsp; Trying to put in a access-list statement for an external IP to a DMZ ip address allowing only 80 and 443.&amp;nbsp; this is the statement -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 4 extended permit tcp host 12.133.197.99 eq www host 192.168.1.11 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the packet-tracer output....&lt;/P&gt;&lt;P&gt;Obviously getting dropped but where?!?!?!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: dmz1&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:12:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421908#M307719</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2019-03-12T03:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421909#M307720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a minor mistake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 4 extended permit tcp host x.x.197.99 &lt;SPAN style="color: #ff0000;"&gt;eq www&lt;/SPAN&gt; host 192.168.1.11 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is that you define the source port as TCP/80 also (WWW/HTTP). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will not be the case. The clients source ports is pretty much always a random source port and you rarely know it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So change your ACL to this to allow both HTTP and HTTPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 4 extended permit tcp host x.x.197.99 host 192.168.1.11 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 5 extended permit tcp host x.x.197.99 host 192.168.1.11 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above simply allows destination port TCP/80 and TCP/443 connections from the single source IP address. As we dont mention any source port after the source IP address that means any source port is fine and this is how it should be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Dec 2013 20:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421909#M307720</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-04T20:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421910#M307723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you should see an UN-NAT Phase among the very first few Phases for this traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this traffic is coming from the external/public network then the host on the DMZ needs to have a public NAT IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that you are using a software level 8.3 or newer since you refer to actual DMZ server local IP address as the destination in the ACL that is attached to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using an ASA software of 8.2 or below then the ACL rules destination IP address should be the NAT IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Dec 2013 20:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421910#M307723</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-04T20:57:39Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421911#M307726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;morning, sorry for the delay got caught up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the nat is in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;28 (dmz1) to (outside) source static obj-192.168.1.11 12.133.197.99&amp;nbsp;&amp;nbsp; service tcp www https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 22&lt;/P&gt;&lt;P&gt;not sure if I have the acl in the right spot though since there are multiple outside acl's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;getting the same output from packet tracer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 13:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421911#M307726</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T13:56:13Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421912#M307728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;new packet tracer out put after I added the statement to allow all from the outside to dmz address&lt;/P&gt;&lt;P&gt;still dropping though&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 192.168.1.11 eq www&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.11&lt;/P&gt;&lt;P&gt; nat (dmz1,outside) static 12.133.197.99 service tcp www https&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: dmz1&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 14:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421912#M307728</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T14:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421913#M307732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that the NAT configurations is wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should see the UN-NAT phase at the very start of the&lt;STRONG&gt; "packet-tracer"&lt;/STRONG&gt;. You also have to use the public NAT IP address as the destination IP in the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share your NAT configuration related to these rules and the contents of the &lt;STRONG&gt;"object" &lt;/STRONG&gt;and &lt;STRONG&gt;"object-group" &lt;/STRONG&gt;you might be using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that you are doing Static PAT but your are mapping the port TCP/80 to the port TCP/443 which doesnt make sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are doing Static PAT for ports TCP/80 and TCP/443 then you should have something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz1,outside) static x.x.197.99 service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz1,outside) static x.x.197.99 service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should what is the name of the ACL attached to your &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. You can do that with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group | inc outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can add to that ACL these lines&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; permit tcp any object SERVER-TCP80 eq 80&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; permit tcp any object SERVER-TCP443 eq 443&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 14:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421913#M307732</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T14:32:42Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421914#M307736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my mistake on the packet tracer and I just re-ran.&amp;nbsp; I am getting nat for the dmz segment to another address but all is allowed...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 12.133.197.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group dmz1_acl in interface dmz1&lt;/P&gt;&lt;P&gt;access-list dmz1_acl extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.0&lt;/P&gt;&lt;P&gt; nat (dmz1,outside) dynamic 12.133.197.72&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate WebServer2/12345 to 12.133.197.72/52673&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 426842629, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: dmz1&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 14:40:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421914#M307736</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T14:40:03Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421915#M307738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the object-group output - &lt;/P&gt;&lt;P&gt;object-group network og_ip_nat_dmz2&lt;/P&gt;&lt;P&gt; network-object 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object-group icmp-type safe_icmp&lt;/P&gt;&lt;P&gt; icmp-object echo&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;object-group network COS-Clients&lt;/P&gt;&lt;P&gt; network-object host Lucille&lt;/P&gt;&lt;P&gt; network-object host commandview&lt;/P&gt;&lt;P&gt; network-object host vDR04&lt;/P&gt;&lt;P&gt; network-object host vc&lt;/P&gt;&lt;P&gt; network-object host mis2&lt;/P&gt;&lt;P&gt; network-object host fps1&lt;/P&gt;&lt;P&gt; network-object host BACKUP2&lt;/P&gt;&lt;P&gt; network-object host hpsim&lt;/P&gt;&lt;P&gt; network-object host p2v&lt;/P&gt;&lt;P&gt; network-object host Jill&lt;/P&gt;&lt;P&gt; network-object host commandview2&lt;/P&gt;&lt;P&gt; network-object host BACKUP3&lt;/P&gt;&lt;P&gt; network-object host CELLMGR&lt;/P&gt;&lt;P&gt; network-object host vc2&lt;/P&gt;&lt;P&gt; network-object host vDR01&lt;/P&gt;&lt;P&gt; network-object host vDR02&lt;/P&gt;&lt;P&gt; network-object host vDR03&lt;/P&gt;&lt;P&gt; network-object host Liam&lt;/P&gt;&lt;P&gt;object-group network ESX-Servers&lt;/P&gt;&lt;P&gt; network-object host esx01&lt;/P&gt;&lt;P&gt; network-object host esx02&lt;/P&gt;&lt;P&gt; network-object host esx03&lt;/P&gt;&lt;P&gt; network-object host vMa01&lt;/P&gt;&lt;P&gt; network-object host vMa02&lt;/P&gt;&lt;P&gt; network-object host vMa03&lt;/P&gt;&lt;P&gt; network-object host esx04&lt;/P&gt;&lt;P&gt; network-object host vMa04&lt;/P&gt;&lt;P&gt; network-object host esx05&lt;/P&gt;&lt;P&gt; network-object host vMa05&lt;/P&gt;&lt;P&gt;object-group network HPSIM-Server&lt;/P&gt;&lt;P&gt; network-object host hpsim&lt;/P&gt;&lt;P&gt;object-group network UPS-Management&lt;/P&gt;&lt;P&gt; network-object host sups-01&lt;/P&gt;&lt;P&gt; network-object host sups-02&lt;/P&gt;&lt;P&gt; network-object host sups-03&lt;/P&gt;&lt;P&gt; network-object host sups-07&lt;/P&gt;&lt;P&gt; network-object host sups-10&lt;/P&gt;&lt;P&gt;object-group service COS-Access-TCP tcp&lt;/P&gt;&lt;P&gt; port-object eq 902&lt;/P&gt;&lt;P&gt; port-object eq 903&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 3052&lt;/P&gt;&lt;P&gt; port-object eq 27000&lt;/P&gt;&lt;P&gt; port-object eq 27010&lt;/P&gt;&lt;P&gt; port-object eq 6547&lt;/P&gt;&lt;P&gt; port-object eq 5480&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq 22024&lt;/P&gt;&lt;P&gt;object-group service COS-Access-UDP udp&lt;/P&gt;&lt;P&gt; port-object eq 902&lt;/P&gt;&lt;P&gt; port-object eq 903&lt;/P&gt;&lt;P&gt;object-group service upsmgmnt tcp&lt;/P&gt;&lt;P&gt; port-object eq 3573&lt;/P&gt;&lt;P&gt; port-object eq 3052&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq 6547&lt;/P&gt;&lt;P&gt;object-group service upsmgmnt_udp udp&lt;/P&gt;&lt;P&gt; port-object eq 3052&lt;/P&gt;&lt;P&gt; port-object eq 200&lt;/P&gt;&lt;P&gt; port-object range 2844 2845&lt;/P&gt;&lt;P&gt; port-object range 4679 4680&lt;/P&gt;&lt;P&gt;object-group service backupexec tcp&lt;/P&gt;&lt;P&gt; port-object range 5204 5221&lt;/P&gt;&lt;P&gt; port-object eq 6101&lt;/P&gt;&lt;P&gt; port-object eq 10000&lt;/P&gt;&lt;P&gt; port-object eq 5555&lt;/P&gt;&lt;P&gt; port-object range 20000 20004&lt;/P&gt;&lt;P&gt; port-object range 20100 20199&lt;/P&gt;&lt;P&gt; port-object range 18000 18049&lt;/P&gt;&lt;P&gt;object-group service hpsim-tcp tcp&lt;/P&gt;&lt;P&gt; port-object eq 1125&lt;/P&gt;&lt;P&gt; port-object eq 1126&lt;/P&gt;&lt;P&gt; port-object eq 5988&lt;/P&gt;&lt;P&gt; port-object eq 5989&lt;/P&gt;&lt;P&gt;object-group service hpsim-udp udp&lt;/P&gt;&lt;P&gt; port-object eq snmp&lt;/P&gt;&lt;P&gt;object-group service OFFICESCAN tcp&lt;/P&gt;&lt;P&gt; port-object eq 8080&lt;/P&gt;&lt;P&gt; port-object eq 4343&lt;/P&gt;&lt;P&gt; port-object eq 34515&lt;/P&gt;&lt;P&gt;object-group network og_ip_nat_dmz1&lt;/P&gt;&lt;P&gt; network-object 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object-group network Email-Port-25&lt;/P&gt;&lt;P&gt; network-object host Exchange&lt;/P&gt;&lt;P&gt; network-object host SPAM1&lt;/P&gt;&lt;P&gt; network-object host SPAM2&lt;/P&gt;&lt;P&gt;object-group network Blacklist&lt;/P&gt;&lt;P&gt; network-object 206.51.26.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 193.109.81.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 204.187.87.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 206.53.144.0 255.255.240.0&lt;/P&gt;&lt;P&gt; network-object 216.9.240.0 255.255.240.0&lt;/P&gt;&lt;P&gt; network-object 67.223.64.0 255.255.224.0&lt;/P&gt;&lt;P&gt; network-object 93.186.16.0 255.255.240.0&lt;/P&gt;&lt;P&gt; network-object 68.171.224.0 255.255.224.0&lt;/P&gt;&lt;P&gt; network-object 74.82.64.0 255.255.224.0&lt;/P&gt;&lt;P&gt; network-object 173.247.32.0 255.255.224.0&lt;/P&gt;&lt;P&gt; network-object 178.239.80.0 255.255.240.0&lt;/P&gt;&lt;P&gt; network-object 180.168.204.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 5.100.168.0 255.255.248.0&lt;/P&gt;&lt;P&gt; network-object 180.149.148.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 131.117.168.0 255.255.248.0&lt;/P&gt;&lt;P&gt;object-group service prtg-UDP udp&lt;/P&gt;&lt;P&gt; port-object eq snmptrap&lt;/P&gt;&lt;P&gt; port-object eq 2048&lt;/P&gt;&lt;P&gt;object-group service ARCGIS-IN_tcp tcp&lt;/P&gt;&lt;P&gt; port-object eq 27000&lt;/P&gt;&lt;P&gt; port-object eq 27010&lt;/P&gt;&lt;P&gt;object-group service MitelIN-MBG_tcp tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 4443&lt;/P&gt;&lt;P&gt; port-object eq 6801&lt;/P&gt;&lt;P&gt; port-object eq 6802&lt;/P&gt;&lt;P&gt; port-object eq 3998&lt;/P&gt;&lt;P&gt; port-object eq 6880&lt;/P&gt;&lt;P&gt;object-group service MitelIN-MBG_udp udp&lt;/P&gt;&lt;P&gt; port-object range 20000 20499&lt;/P&gt;&lt;P&gt; port-object range 1024 65535&lt;/P&gt;&lt;P&gt;object-group service MitelDMZ-IN_tcp tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 4443&lt;/P&gt;&lt;P&gt; port-object eq 6809&lt;/P&gt;&lt;P&gt; port-object eq 6800&lt;/P&gt;&lt;P&gt; port-object eq 6801&lt;/P&gt;&lt;P&gt; port-object eq 6802&lt;/P&gt;&lt;P&gt; port-object eq 3998&lt;/P&gt;&lt;P&gt; port-object eq 6880&lt;/P&gt;&lt;P&gt;object-group service MItelDMZ-IN_udp udp&lt;/P&gt;&lt;P&gt; port-object range 20000 20499&lt;/P&gt;&lt;P&gt; port-object range 1024 65535&lt;/P&gt;&lt;P&gt;object-group service MitelDMZ-MAS_tcp tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 4443&lt;/P&gt;&lt;P&gt;object-group network Mitel-dmz-hosts&lt;/P&gt;&lt;P&gt; network-object MBGDMZ 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object WEBSERVER 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network Mitel-internal-hosts&lt;/P&gt;&lt;P&gt; network-object MASLAN 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object MBGLAN 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service MitelIN-AWC_tcp tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service MitelIN-AWC2_tcp tcp&lt;/P&gt;&lt;P&gt; port-object eq 4443&lt;/P&gt;&lt;P&gt;object-group network Mitel-outside&lt;/P&gt;&lt;P&gt; network-object host 12.33.197.79&lt;/P&gt;&lt;P&gt; network-object host 12.133.197.80&lt;/P&gt;&lt;P&gt;object-group network MItel-dmz-hosts&lt;/P&gt;&lt;P&gt;object-group service MSDTC-DMZ-IN_tcp tcp&lt;/P&gt;&lt;P&gt; port-object range 1024 1054&lt;/P&gt;&lt;P&gt; port-object eq 135sho &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 14:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421915#M307738</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T14:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421916#M307743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please also post the actual &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to have used a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command that simulates a packet coming from the DMZ to WAN rather than anything coming in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration used here is Static NAT for some other server it seems? So it doesnt seem to have anything to do with the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your ealier output told us the problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have this configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-192.168.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz1,outside) static x.x.197.99 service tcp www https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that the internal host is 192.168.1.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration essentially tells the ASA to forward any HTTPS connection coming to public IP address 12.133.197.99 to the internal IP address 192.168.1.11 and to port HTTP (not HTTPS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine that your aim is to forward both HTTP and HTTPS ports to the host 192.168.1.11? The above configuration I suggested should accomplish that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 14:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421916#M307743</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T14:45:58Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421917#M307749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;packet tracer command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz1 tcp 192.168.1.11 12345 12.133.197.99 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;everything is in place as stated above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 14:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421917#M307749</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T14:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421918#M307755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what situation is this supposed to simulate?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It tells me that the host 192.168.1.11 is now trying to connect to its own public IP address with the port TCP/80?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assumed that your goal was to make this DMZ server accessible from the public network with the public IP address x.x.197.99 and ports TCP/80 and TCP/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case the correct &lt;STRONG&gt;"packet-tracer" &lt;/STRONG&gt;commands to simulate that traffic would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 8.8.8.8 12345 x.x.197.99 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 8.8.8.8 12345 x.x.197.99 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source IP address and port is just random IP/port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this was not your goal I would need clarification as to what you are attempting to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421918#M307755</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T15:02:06Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421919#M307764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, yes the idea is to get www and https traffic to the internal ip address of 192. from public ip of 12.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the oject network as stated above and still not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is the packet output from the 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 12345 12.133.197.99 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 12.133.197.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried adding the access-list in both places at different time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz1_acl line 1 extended permit tcp host 12.133.197.99 host 192.168.1.11 eq www (hitcnt=0) 0xe66b97a4&lt;/P&gt;&lt;P&gt;access-list dmz1_acl line 2 extended permit tcp host 12.133.197.99 host 192.168.1.11 eq https (hitcnt=0) 0xfc5e1db8&lt;/P&gt;&lt;P&gt;access-list outside_acl line 38 extended permit tcp any host 192.168.1.11 eq www (hitcnt=2) 0x403d29cb&lt;/P&gt;&lt;P&gt;access-list outside_acl line 39 extended permit tcp any host 192.168.1.11 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;holy frustrating....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421919#M307764</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T15:08:57Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421920#M307767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You most likely have a NAT rule that overrides the Static PAT configurations suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the NAT configuration with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421920#M307767</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T15:11:18Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421921#M307770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;looks like the first .72 is overriding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-10.100.0.0 obj-10.100.0.0 destination static obj-10.6.62.xx8 obj-10.6.62.xx8&lt;BR /&gt;nat (inside,outside) source static obj-10.100.0.0 obj-10.100.0.0 destination static obj-10.6.65.0 obj-10.6.65.0&lt;BR /&gt;nat (inside,outside) source static obj-10.100.0.0 obj-10.100.0.0 destination static obj-10.6.65.xx8 obj-10.6.65.xx8&lt;BR /&gt;!&lt;BR /&gt;object network Exchange&lt;BR /&gt; nat (inside,outside) static xx.xxx.197.66 service tcp www www&lt;BR /&gt;object network Exchange-01&lt;BR /&gt; nat (inside,outside) static xx.xxx.197.66 service tcp https https&lt;BR /&gt;object network SPAM1&lt;BR /&gt; nat (inside,outside) static xx.xxx.197.66 service tcp smtp smtp&lt;BR /&gt;object network SPAM2&lt;BR /&gt; nat (inside,outside) static xx.xxx.197.68 service tcp smtp smtp&lt;BR /&gt;object network EVAULT1&lt;BR /&gt; nat (inside,outside) static xx.xxx.197.70 service tcp https https&lt;BR /&gt;object network MBGDMZ&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.79&lt;BR /&gt;object network obj-10.1.0.0&lt;BR /&gt; nat (inside,dmz2) static 10.1.0.0 no-proxy-arp route-lookup&lt;BR /&gt;object network obj-10.1.0.0-01&lt;BR /&gt; nat (inside,dmz1) static 10.1.0.0 no-proxy-arp route-lookup&lt;BR /&gt;object network prtg&lt;BR /&gt; nat (inside,outside) static xx.xxx.197.78&lt;BR /&gt;object network obj-10.100.0.0&lt;BR /&gt; nat (inside,outside) dynamic xx.xxx.197.72&lt;BR /&gt;object network obj-10.1.0.0-02&lt;BR /&gt; nat (inside,outside) dynamic xx.xxx.197.72&lt;BR /&gt;object network obj-10.2.0.0&lt;BR /&gt; nat (inside,outside) dynamic xx.xxx.197.72&lt;BR /&gt;object network obj-10.3.0.0&lt;BR /&gt; nat (inside,outside) dynamic xx.xxx.197.72&lt;BR /&gt;object network obj-10.50.1.0&lt;BR /&gt; nat (HTINetwork,outside) dynamic xx.xxx.197.72&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (Guest,outside) dynamic xx.xxx.197.72&lt;BR /&gt;object network MBGDMZ-01&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.79 service tcp 6880 6880&lt;BR /&gt;object network obj-192.168.1.203&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.73&lt;BR /&gt;object network obj-192.168.1.198&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.75&lt;BR /&gt;object network WEBSERVER&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.69&lt;BR /&gt;object network ARCGIS&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.81&lt;BR /&gt;object network MBGDMZ-02&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.79&lt;BR /&gt;&lt;STRONG&gt;object network obj-192.168.1.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nat (dmz1,outside) dynamic xx.xxx.197.72&lt;/STRONG&gt;&lt;BR /&gt;object network WEBDEVEL&lt;BR /&gt; nat (dmz2,outside) static xx.xxx.197.76&lt;BR /&gt;object network obj-192.168.2.0&lt;BR /&gt; nat (dmz2,outside) dynamic xx.xxx.197.72&lt;BR /&gt;object network esx01&lt;BR /&gt; nat (COS,inside) static esx01 no-proxy-arp route-lookup&lt;BR /&gt;object network esx02&lt;BR /&gt; nat (COS,inside) static esx02 no-proxy-arp route-lookup&lt;BR /&gt;object network esx03&lt;BR /&gt; nat (COS,inside) static esx03 no-proxy-arp route-lookup&lt;BR /&gt;object network vMa01&lt;BR /&gt; nat (COS,inside) static vMa01 no-proxy-arp route-lookup&lt;BR /&gt;object network vMa02&lt;BR /&gt; nat (COS,inside) static vMa02 no-proxy-arp route-lookup&lt;BR /&gt;object network vMa03&lt;BR /&gt; nat (COS,inside) static vMa03 no-proxy-arp route-lookup&lt;BR /&gt;object network masdmz&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.80&lt;BR /&gt;object network MBGDMZ-06&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.79 service tcp www www&lt;BR /&gt;object network MBGDMZ-07&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.79 service tcp https https&lt;BR /&gt;object network MBGDMZ-08&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.79&lt;BR /&gt;object network Mitel_443_4443&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.80 service tcp https 4443&lt;BR /&gt;object network esx04&lt;BR /&gt; nat (COS,inside) static esx04 no-proxy-arp route-lookup&lt;BR /&gt;object network vMA04&lt;BR /&gt; nat (COS,inside) static vMA04 no-proxy-arp route-lookup&lt;BR /&gt;object network PAHRC&lt;BR /&gt; nat (dmz1,outside) static xx.xxx.197.100&lt;BR /&gt;object network esx05&lt;BR /&gt; nat (COS,inside) static esx05 no-proxy-arp route-lookup&lt;BR /&gt;object network vMa05&lt;BR /&gt; nat (COS,inside) static vMa05 no-proxy-arp route-lookup&lt;BR /&gt;&lt;STRONG&gt;object network obj-192.168.1.11&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nat (dmz1,outside) static xx.xxx.197.99 service tcp www https&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421921#M307770</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T15:25:14Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421922#M307774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should not be overriding it since we are talking about a completely different public IP address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your connections would be coming towards the IP address x.x.197.99 from the public network and NAT configurations that use the IP address x.x.197.72 should not have anything to do with the operation of the x.x.197.99 NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this still is NOT the correct configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-192.168.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;nat (dmz1,outside) static xx.xxx.197.99 service tcp www https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz1,outside) static x.x.197.99 service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz1,outside) static x.x.197.99 service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see those configurations in the above listing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Insert the correct public IP address instead of the x.x.197.99. You can naturally change the name of the above objects but otherwise the configurations should be like mentioned above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After you have those configurations you could test them with &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 8.8.8.8 12345 x.x.197.99 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 8.8.8.8 12345 x.x.197.99 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421922#M307774</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T15:34:01Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421923#M307776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WOW! holy long drive for a short putt!&lt;/P&gt;&lt;P&gt;I am sorry that took so long.&amp;nbsp; And I thank you for bearing with my ignorance.&lt;/P&gt;&lt;P&gt;I did have the nat in there as of last night but I was using the tcp www https instead of the seperate nats.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you again!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421923#M307776</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-12-05T15:51:43Z</dc:date>
    </item>
    <item>
      <title>outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2421924#M307779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear its working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to add a bit. The NAT we configured is a Static PAT that is generally used when you only have a few public IP addresses to spare OR even just the public IP address configured on the external interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that you have quite a bit of public IP address available judging by your above configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it might even be possible that you configure a single Static NAT for the DMZ server 192.168.1.11 to the IP address x.x.197.99.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case you would only need to allow the traffic for the ports you need and would not have to worry about separate NAT configurations for ports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you were to go with Static NAT you could remove the 2 Static PAT configurations and instead configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz1,outside) static x.x.197.99&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I leave it up to you to choose which one you prefer. If possible I personally prefer doing Static NAT if I can spare the public IP addresses. Keeps the NAT setup more simple.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 15:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2421924#M307779</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T15:58:12Z</dc:date>
    </item>
  </channel>
</rss>

