<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with my first ASA config. (NAT/PAT) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363265#M309470</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And I can connect to the ASA just fine remotely. I am currently in there via CLI and ASDM. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Nov 2013 22:20:33 GMT</pubDate>
    <dc:creator>jeffrey77</dc:creator>
    <dc:date>2013-11-11T22:20:33Z</dc:date>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363240#M309440</link>
      <description>&lt;P&gt;I am trying to set up NAT/PAT for access to a webserver behind the ASA.&amp;nbsp; (Running 8.4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a single Static IP on the outside interface (70.102.23.xxx) and I have a webserver with an IP of 192.168.0.1 and I need to make sure all http requests are sent to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can do this in a IOS router pretty well, but in the ASA I seem to get turned around pretty easily.&amp;nbsp; I would like to do it via CLi but will accept help with doing it via ASDM as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already have created an access list to allow the traffic to the webserver. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jeffrey&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363240#M309440</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2019-03-12T03:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363241#M309441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration is probably something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WEB-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 192.168.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (inside,outside) static interface service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in permit tcp any object WEB-SERVER eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the exact form we would need to see the current firewall configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this doesnt get it to work then you should provide us with the output of the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 &lt;YOUR public="" ip=""&gt; 80&lt;/YOUR&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 18:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363241#M309441</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-06T18:53:37Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363242#M309442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I got if this helps. (I will test out what you gave me soon)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*I feel there may be some stuff in there that is not needed as all they really need s access to the webserver from the outside world, and shell access over port 39124*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to tell me if you see something that is not needed (I was trying out ASDM and it may have put a BUNCH of crap in there that is superfluous*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Server&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt; description Created during name migration&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network WEBSERVER&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object network 70.102.23.162&lt;/P&gt;&lt;P&gt; host 70.102.23.162&lt;/P&gt;&lt;P&gt;object service http&lt;/P&gt;&lt;P&gt; service tcp source eq www destination eq www&lt;/P&gt;&lt;P&gt;object-group service HTTP&lt;/P&gt;&lt;P&gt; service-object tcp source eq www&lt;/P&gt;&lt;P&gt;object-group service SSH&lt;/P&gt;&lt;P&gt; description Remote server access&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 39124&lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Webserver&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp any any eq www&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.100.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Webserver&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any object Server eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Remote Server access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object Server eq 39124&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list NAT-EXEMPT extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool SSLVPN 192.168.100.100-192.168.100.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL_LAN LOCAL_LAN destination static SSLVPN_NETWORK SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static SSLVPN_NETWORK SSLVPN_NETWORK destination static LOCAL_LAN LOCAL_LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 15:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363242#M309442</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-07T15:40:30Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363243#M309443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that you have a basic Dynamic PAT for Internet access and NAT0 / NAT Exempt for VPN Client traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding the Static PAT I suggested should forward the port you need. You seem to have allowed the needed traffic already&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in remark Webserver&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit udp any object Server eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in remark Remote Server access&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object Server eq 39124&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you will need the Static PAT for the TCP/39124 also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WEB-SERVER-TCP39214&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 192.168.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (inside,outside) static interface service tcp 39124 39124&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think you need the following configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source static SSLVPN_NETWORK SSLVPN_NETWORK destination static LOCAL_LAN LOCAL_LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 15:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363243#M309443</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-07T15:50:48Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363244#M309444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So this is what I currently have in the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 70.102.23.162&lt;/P&gt;&lt;P&gt; host 70.102.23.162&lt;/P&gt;&lt;P&gt;object service http&lt;/P&gt;&lt;P&gt; service tcp source eq www destination eq www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object-group service HTTP&lt;/P&gt;&lt;P&gt; service-object tcp source eq www&lt;/P&gt;&lt;P&gt;object-group service SSH&lt;/P&gt;&lt;P&gt; description Remote server access&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 39124&lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Webserver&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp any any eq www&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.100.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Webserver&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any object WEB-SERVER eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq 39124&lt;/P&gt;&lt;P&gt;access-list NAT-EXEMPT extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool SSLVPN 192.168.100.100-192.168.100.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL_LAN LOCAL_LAN destination static SSLVPN_NETWORK SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static SSLVPN_NETWORK SSLVPN_NETWORK destination static LOCAL_LAN LOCAL_LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 39124 39124&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're saying I don't need the: &lt;STRONG&gt;no nat (inside,outside) source static SSLVPN_NETWORK SSLVPN_NETWORK destination static LOCAL_LAN LOCAL_LAN&amp;nbsp; &lt;/STRONG&gt;statment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought I needed to add it for both directions. Is this not true?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(I also cleaned up the network objects as you can see and got rid of the "Server" one and just am using the "WEB_SERVER" one.&amp;nbsp; Is this ok?&amp;nbsp; Also both packet-tracer tests passed with port 80 and 39124. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CMNW# packet-tracer input outside tcp 1.1.1.1 12345 50.186.40.128 39124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 39124 39124&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 50.186.40.128/39124 to Server/39124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 39124 39124&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1607, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CMNW# packet-tracer input outside tcp 1.1.1.1 12345 50.186.40.128 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 50.186.40.128/80 to Server/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1609, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 16:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363244#M309444</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-07T16:06:31Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363245#M309445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can use the single &lt;STRONG&gt;"object"&lt;/STRONG&gt; created for the ACL rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the &lt;STRONG&gt;"nat" &lt;/STRONG&gt;configuration I suggest you remove, it is not needed. The other &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration before it already contains everything needed. That rule is bidirectional so only one configuration needed for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your &lt;STRONG&gt;"outside_access_in"&lt;/STRONG&gt; ACL should be cleaned up a bit also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in remark Webserver&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any any eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit icmp any any echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in remark WEB-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit udp any object WEB-SERVER eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in remark WEB-SERVER access&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq 39124&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do these changes. They should remove some rules (like one permitting ALL traffic) and later insert one of the rules to the correct line in the ACL. Mostly to make the ACL be in better order with regards to the &lt;STRONG&gt;"remark" &lt;/STRONG&gt;lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in remark Webserver&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit tcp any any eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit tcp any object WEB-SERVER eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit udp any object WEB-SERVER eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 4 extended permit tcp any object WEB-SERVER eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; seems fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 16:15:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363245#M309445</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-07T16:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363246#M309446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you got the connections working. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They should work even without the above ACL changes but it would be good to make the above changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 16:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363246#M309446</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-07T16:39:17Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363247#M309447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I get what you are saying now. And I was thinking of removing those ACL's as well (They were created when i did something with the ASDM)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how it stands now:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.0.1 Server description Server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa844-1-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 70.102.23.162&lt;/P&gt;&lt;P&gt; host 70.102.23.162&lt;/P&gt;&lt;P&gt;object service http&lt;/P&gt;&lt;P&gt; service tcp source eq www destination eq www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object-group service HTTP&lt;/P&gt;&lt;P&gt; service-object tcp source eq www&lt;/P&gt;&lt;P&gt;object-group service SSH&lt;/P&gt;&lt;P&gt; description Remote server access&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 39124&lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Webserver&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp any any eq www&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.100.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq 39124&lt;/P&gt;&lt;P&gt;access-list NAT-EXEMPT extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool SSLVPN 192.168.100.100-192.168.100.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL_LAN LOCAL_LAN destination static SSLVPN_NETWORK SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 39124 39124&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look good?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 16:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363247#M309447</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-07T16:58:19Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363248#M309448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes it looks good to me. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 17:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363248#M309448</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-07T17:02:45Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363249#M309449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answering here with regards to your PM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The correct default route configuration format is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 &lt;GATEWAY ip=""&gt;&lt;/GATEWAY&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Nov 2013 20:42:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363249#M309449</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-08T20:42:14Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363250#M309450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the 1 at the end is not required?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Nov 2013 20:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363250#M309450</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-08T20:44:59Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363251#M309451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its the default value for a staticly configured route. It will be added there automatically so I dont usually enter it there. It will show up in the configuration after you have inserted the command though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the output of&amp;nbsp; &lt;STRONG&gt;"show run route"&lt;/STRONG&gt; after you have configured a static route and you should see it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Nov 2013 20:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363251#M309451</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-08T20:48:12Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363252#M309452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I do see it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Gateway of last resort is 10.102.23.161 to network 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again much!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Nov 2013 20:49:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363252#M309452</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-08T20:49:38Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363253#M309453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I made the changes above and now I am testing everything again before heading out in an hour or so and the packet tracer is failing &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CMNW(config)# packet-tracer input outside tcp 1.1.1.1 80 70.102.23.161 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 70.102.23.160&amp;nbsp;&amp;nbsp; 255.255.255.252 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CMNW(config)# packet-tracer input outside tcp 1.1.1.1 12345 70.102.23.161 39124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 70.102.23.160&amp;nbsp;&amp;nbsp; 255.255.255.252 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CMNW(config)# packet-tracer input outside tcp 1.1.1.1 80 70.102.23.161 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What changed??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname CMNW&lt;/P&gt;&lt;P&gt;enable password RF6LqGyeeuDAGlOY encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.0.1 Server description Server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 70.102.23.162 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa844-1-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 70.102.23.162&lt;/P&gt;&lt;P&gt; host 70.102.23.162&lt;/P&gt;&lt;P&gt;object service http&lt;/P&gt;&lt;P&gt; service tcp source eq www destination eq www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object-group service HTTP&lt;/P&gt;&lt;P&gt; service-object tcp source eq www&lt;/P&gt;&lt;P&gt;object-group service SSH&lt;/P&gt;&lt;P&gt; description Remote server access&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 39124&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.100.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq 39124&lt;/P&gt;&lt;P&gt;access-list NAT-EXEMPT extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool SSLVPN 192.168.100.100-192.168.100.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL_LAN LOCAL_LAN destination static SSLVPN_NETWORK SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 39124 39124&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 70.102.23.161 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 16:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363253#M309453</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-11T16:19:34Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363254#M309454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The target IP address is wrong for the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your commands IP address ends with .161 while your interface IP address ends with .162. And when you look at the NAT configurations you are using the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; IP address in the Static PAT (Port Forward) configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So test the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; with the .162 target IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 16:22:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363254#M309454</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-11T16:22:51Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363255#M309455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I see it. When I did the test i put in the Default Gateway and not the IP of the outside interface. &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 16:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363255#M309455</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-11T16:29:30Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363256#M309456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes thank you! I saw it and posted my reply and then saw yours. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 16:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363256#M309456</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-11T16:30:06Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363257#M309459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I am on site and I am testing the remote access on port 80 and ssh on 39124 and it is not working for some reason.,..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure why. Packet tracer looks fine when I run it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 20:25:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363257#M309459</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-11T20:25:37Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363258#M309460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you testing from the Internet or behind the ASA from the internal network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the Static PAT (Port Forward) configurations that we did only work from the external network (behind&lt;STRONG&gt; "outside" &lt;/STRONG&gt;interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For you to be able to connect to the public IP address from the internal network you would have to configure some other NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I am not sure from where you are trying to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 20:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363258#M309460</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-11T20:51:22Z</dc:date>
    </item>
    <item>
      <title>Help with my first ASA config. (NAT/PAT)</title>
      <link>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363259#M309463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At the time I was connecting out via my cell phone hotspot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am now back at my office and still cannot connect tot he server at the internal IP of 192.168.0.1 via port 39124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.0.1 Server description Server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 70.102.23.162 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa844-1-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 8.8.4.4&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 70.102.23.162&lt;/P&gt;&lt;P&gt; host 70.102.23.162&lt;/P&gt;&lt;P&gt;object service http&lt;/P&gt;&lt;P&gt; service tcp source eq www destination eq www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt;object-group service HTTP&lt;/P&gt;&lt;P&gt; service-object tcp source eq www&lt;/P&gt;&lt;P&gt;object-group service SSH&lt;/P&gt;&lt;P&gt; description Remote server access&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 39124&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.100.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark WEB-SERVER access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object WEB-SERVER eq 39124&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any object WEB-SERVER-TCP39214 eq 39124&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any object WEB-SERVER eq 39124&lt;/P&gt;&lt;P&gt;access-list NAT-EXEMPT extended permit ip 192.168.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool SSLVPN 192.168.100.100-192.168.100.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL_LAN LOCAL_LAN destination static SSLVPN_NETWORK SSLVPN_NETWORK&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network WEB-SERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-TCP39214&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 39124 39124&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 70.102.23.161 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Nov 2013 21:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-my-first-asa-config-nat-pat/m-p/2363259#M309463</guid>
      <dc:creator>jeffrey77</dc:creator>
      <dc:date>2013-11-11T21:22:11Z</dc:date>
    </item>
  </channel>
</rss>

