<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Outside IP Inside Clients...cant connect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321572#M310551</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I really dont want to use the Sonicwall, this all happened when I changed my outside IP from 64.61.107.66&amp;nbsp;&amp;nbsp;&amp;nbsp; to 64.61.107.78&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Oct 2013 14:46:52 GMT</pubDate>
    <dc:creator>wperez001</dc:creator>
    <dc:date>2013-10-28T14:46:52Z</dc:date>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321564#M310533</link>
      <description>&lt;P&gt;I have a situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a web server on the outside with an ip of 62.61.107.68 , my asa is 62.61.107.78 , my inside is 10.1.15.1-254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I put a DMZ Switch where the server connects and&amp;nbsp; the Firewall connect so I am not using a DMZ port on the ASA. none of my inside pcs can reach the web server. Everyone else in the world can, what am i missing?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321564#M310533</guid>
      <dc:creator>wperez001</dc:creator>
      <dc:date>2019-03-12T02:54:52Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321565#M310535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, can you get me the configuration of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run the next command on the ASA CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 10.1.15.250 1025 62.61.107.68 80 detail&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 23:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321565#M310535</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-22T23:05:54Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321566#M310537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 64.61.107.64&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.240 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside in interface inside control-plane&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xad180748, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=131559, user_data=0xa8b11900, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xab920bb0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=208926, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_nat_outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.1.15.0 255.255.255.0 outside host 64.61.107.68&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (64.61.107.78 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 81, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.1.15.250/1025 to 64.61.107.78/43762 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xadfea5a0, priority=2, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=81, user_data=0xaddf0218, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.1.15.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=64.61.107.68, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_nat_outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.1.15.0 255.255.255.0 outside host 64.61.107.68&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (64.61.107.78 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 81, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xaddf15d8, priority=2, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=144940, user_data=0xaddf0218, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.1.15.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xab8d29c8, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=201047, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 216034, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 01:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321566#M310537</guid>
      <dc:creator>wperez001</dc:creator>
      <dc:date>2013-10-23T01:28:56Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321567#M310539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that your have the users and the Web server in the same network and that you are trying to connect to it with some public IP address that is configured on the firewall with Static NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so then this is not possible without adding some additional NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would really need to see some firewall configurations and possibly some simple network layout picture as I am not clear what you mean with the switch setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 15:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321567#M310539</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-23T15:03:11Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321568#M310542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the packet tracer it seems that the connection should go through without any problem so I need addionational information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your PC please send me the next:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cmd &amp;gt; ipconfig /all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cmd &amp;gt; route print&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cmd &amp;gt; nslookup &lt;DOMAIN_OF_THE_SITE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; If it can't resolve you can get to it via domain so do it via IP&lt;/DOMAIN_OF_THE_SITE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cmd &amp;gt;arp -a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please send me the next:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-"show arp" from the ASA CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Enable logging on the ASA over CLI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; config t&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; logging on &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; logging buffered debugging&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; logging buffer-size 1048576&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; logging asdm debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can view the logs two ways, or through CLI or ASDM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- To view over CLI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show log | in 62.61.107.68&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To view over ASDM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pull up ASDM - If you have access to ASDM all you need to do is go to monitor&amp;gt; logging &amp;gt; real time log viewer&amp;gt; filter the IP address that you are tryting to reach "62.61.107.68"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, could you please send me a screen shot of when you try to access the site via IP or domain from your PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we don't see anything clear here we will need to setup wireshark on your PC and maybe captures on the ASA but we will go through that route if needed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 17:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321568#M310542</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-23T17:13:30Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321569#M310546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you still need assistance, please let us know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 20:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321569#M310546</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-25T20:39:49Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321570#M310548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ive attached the running config above and this is an illustration of the dmz switch. I do not use a dmz port on the asa, only and inside and outside port. I swapped my firewall out with a sonicwall in the meantime while this problem gets resolved. sonicwall worked instantly I can see the server on the dmz switch without having to create any rule. im going to delete my config if needed and start over.&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/0/2/163206-ktY3JR5%5B1%5D.jpg" class="jive-image" /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Oct 2013 02:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321570#M310548</guid>
      <dc:creator>wperez001</dc:creator>
      <dc:date>2013-10-26T02:06:20Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321571#M310549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the picture seems to suggest that there is no DMZ but that the server is actually attached to the Internet directly without any kind of protection from the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have just connected the switch to the WAN port of the ASA and the server to the switch (and the switch to whatever device provides you with the WAN connection) then the users behind the ASA and the server behind the ASA should be able to connect. The server should see traffic coming from directly connected network as the users are probably using Dynamic PAT to the interface IP address of the ASAs WAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are switching the ASA with the other firewall and they are both using the same public IP address on their WAN port then I would suggest checking the ARP on the actual server so it doesnt still show the old firewalls MAC address in the ARP table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; already tolds us the Dynamic PAT is happening for the LAN users and the traffic is allowed so it might even be that the ARP on the actual server might be the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also use captures on the ASA if you want&amp;nbsp; to confirm if any traffic is coming back from the server to the users. You could also monitor the ASA logs through ASDM while connecting to the server to see what happens to the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could go as far as checking the MAC address of the Sonicwalls WAN interface. You could then configure that MAC address on the ASA WAN interface just to test if its a simple ARP problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; mac-address aaaa.bbbb.cccc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Oct 2013 11:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321571#M310549</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-26T11:29:45Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321572#M310551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I really dont want to use the Sonicwall, this all happened when I changed my outside IP from 64.61.107.66&amp;nbsp;&amp;nbsp;&amp;nbsp; to 64.61.107.78&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 14:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321572#M310551</guid>
      <dc:creator>wperez001</dc:creator>
      <dc:date>2013-10-28T14:46:52Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321573#M310553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand your issue but we need you to help us out deducting the source cause of failure, I have sent you steps to follow and requested outputs that need to be taken to help you but you have not reply with what we need. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help us help you by helping yourself and following our troubleshooting steps if not I guess that it is up to you if you want to route through another direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the problem is that you don’t know how to takeout the outputs then I would suggest opening up a TAC ticket.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 17:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321573#M310553</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-28T17:39:31Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321574#M310555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please update the ticket as resolved or answered so we can close out followup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 17:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321574#M310555</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-31T17:56:06Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321575#M310558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you guys. ( I will start a new topic on gettign the VPN to work)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 19:08:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321575#M310558</guid>
      <dc:creator>wperez001</dc:creator>
      <dc:date>2013-10-31T19:08:19Z</dc:date>
    </item>
    <item>
      <title>Outside IP Inside Clients...cant connect</title>
      <link>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321576#M310561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; While I had my users on the Sonicwall, it afect my Citrix Users, the connections was dropping left and right when I put them back on the ASA the connection never dropped. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 19:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-ip-inside-clients-cant-connect/m-p/2321576#M310561</guid>
      <dc:creator>wperez001</dc:creator>
      <dc:date>2013-10-31T19:09:55Z</dc:date>
    </item>
  </channel>
</rss>

