<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Phase8 NAT drops in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278375#M310840</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Told you i was confused.&amp;nbsp; It was just the NATs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Removed the acl and it all continues to function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all i needed was:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (K_Inc,FOS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're the best.&amp;nbsp; Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Oct 2013 19:08:41 GMT</pubDate>
    <dc:creator>WStoffel1</dc:creator>
    <dc:date>2013-10-16T19:08:41Z</dc:date>
    <item>
      <title>Phase8 NAT drops</title>
      <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278369#M310824</link>
      <description>&lt;P&gt;I'm having trouble getting traffic from one sub interface to another.&amp;nbsp; Logically I know what the issue is, I'm just having issues working through it based on this packet tracer output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I sit behind the K_Inc interface and need to get to the FOS interface.&amp;nbsp; There is no ACL to allow the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You'll have to pardon the santized config, i realize that's a pain, but hopefully it's enough to get me pointing in the right direction &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are routes to my core switch that send traffic for 10/10 to my core from the 192.168.10.0/24 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 7.x.x.21 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.10&lt;/P&gt;&lt;P&gt; vlan 10&lt;/P&gt;&lt;P&gt; nameif K_Inc&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.177&lt;/P&gt;&lt;P&gt; vlan 177&lt;/P&gt;&lt;P&gt; nameif FOS&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.177.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (K_Inc) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (FOS) 1 192.168.177.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (FOS,outside) 7.x.x190 192.168.177.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (FOS,outside) 7.x.x.191 192.168.177.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (FOS,outside) 7.x.x.192 192.168.177.9 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 7.x.x.1 1&lt;/P&gt;&lt;P&gt;route K_Inc 10.0.0.0 255.192.0.0 192.168.10.252 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input K_Inc tcp 10.10.80.49 1065 192.168.177.10 3389 det&lt;/P&gt;&lt;P&gt;yields:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xb88abc98, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=253726471, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.177.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; FOS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xb88ac280, priority=2, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=667120, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xb88adb60, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=13897343, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xb88ab3b8, priority=20, domain=lu, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=7400090, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (K_Inc,dmz) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip K_Inc 10.10.0.0 255.255.0.0 dmz any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 48365, untranslate_hits = 38813&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacf39b88, priority=5, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=8592687, user_data=0xacc23618, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.10.0.0, mask=255.255.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (K_Inc) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip K_Inc 10.0.0.0 255.0.0.0 FOS any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 44, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacf4c000, priority=1, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=43, user_data=0xacf4bf60, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.0.0.0, mask=255.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: K_Inc&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: FOS&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I thought I needed only seems to break my access to the internet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list FOS_In extended permit tcp 10.10.0.0 255.255.0.0 192.168.177.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group FOS_In in interface K_Inc&lt;/P&gt;&lt;P&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (K_Inc,FOS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278369#M310824</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2019-03-12T02:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Phase8 NAT drops</title>
      <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278370#M310827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine that the &lt;STRONG&gt;"FOS_In"&lt;/STRONG&gt; ACL contains more rules than this single one? If it doesnt then it naturally doesnt allow the traffic to the Internet as the only allowed destination network is a private network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, why is the ACL for the interface&lt;STRONG&gt; "K_Inc"&lt;/STRONG&gt; named &lt;STRONG&gt;"FOS_In"&lt;/STRONG&gt; ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would have personally just tried to configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And tried the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that the traffic originally matched the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement and had no matching &lt;STRONG&gt;"global"&lt;/STRONG&gt; configuration for the destination interface and failed because of that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to my understanding the only thing needed is the above &lt;STRONG&gt;"static" &lt;/STRONG&gt;and you can leave the out the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; that you added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 16:11:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278370#M310827</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T16:11:10Z</dc:date>
    </item>
    <item>
      <title>Phase8 NAT drops</title>
      <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278371#M310829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First thing, I thought of the static NAT first, and it didn't work and I just tried it again, and I get the same result.&amp;nbsp; It's the same Phase8 nat error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I had a very similar issue once before that you helped me with, i was hoping you'd be answering this one. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/message/3999166#3999166"&gt;https://supportforums.cisco.com/message/3999166#3999166&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which is what made me think that traffic isn't allowed.&amp;nbsp; So I did in fact just fix it, you're first comment above was the key, i did have only the one allow statement to the private network.&amp;nbsp; Here's what fixed it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list FOS_In extended permit tcp 10.10.0.0 255.255.0.0 192.168.177.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list FOS_In extended permit ip 10.10.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-group FOS_In in interface K_Inc&lt;/P&gt;&lt;P&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (K_Inc,FOS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's only temporary while they migrate some data from one network to the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In answer to your question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, why is the ACL for the interface "K_Inc" named "FOS_In"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm allowing traffic IN to the FOS network, isnt' that appropriate?&amp;nbsp; Hahaha just kidding.&amp;nbsp; It was just for me because I'll be ripping it out before the end of the day today anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278371#M310829</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-10-16T17:11:15Z</dc:date>
    </item>
    <item>
      <title>Phase8 NAT drops</title>
      <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278372#M310832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that the problems with the ACL was sorted but the problems with the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; and NAT still remains?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What seems wrong to me in the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output is the fact that we should see an UN-NAT Phase at the very start if you had this configured while you took another &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would also seem to me that the original traffic was allowed as there was no ACL configure and the &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;values permitted this traffic (same-security-traffic commands + equal security-level)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said before, the original output would just seem to point to a situation where you have a &lt;STRONG&gt;"nat"&lt;/STRONG&gt; that matches the source address but there is no matching &lt;STRONG&gt;"global"&lt;/STRONG&gt; for the destination IP address. To my understanding the &lt;STRONG&gt;"static" &lt;/STRONG&gt;command should avoid that problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278372#M310832</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T17:33:44Z</dc:date>
    </item>
    <item>
      <title>Phase8 NAT drops</title>
      <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278373#M310835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh man, now I'm confused.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list FOS_In extended permit tcp 10.10.0.0 255.255.0.0 192.168.177.0 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list FOS_In extended permit ip 10.10.0.0 255.255.0.0 any&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-group FOS_In in interface K_Inc&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (K_Inc,FOS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and now everything is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's the packet tracer output which shows the packet's allowed, and i can in fact RDP to the server I needed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this also now has the UN NAT you were looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip FOS 192.168.177.0 255.255.255.0 K_Inc any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.177.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1857&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface FOS&lt;/P&gt;&lt;P&gt;Untranslate 192.168.177.0/0 to 192.168.177.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group FOS_In in interface K_Inc&lt;/P&gt;&lt;P&gt;access-list FOS_In extended permit tcp 10.10.0.0 255.255.0.0 192.168.177.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (K_Inc,FOS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip K_Inc 10.10.0.0 255.255.0.0 FOS any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1856, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 10.10.0.0/0 to 10.10.0.0/0 using netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (K_Inc,dmz) 10.10.0.0 10.10.0.0 netmask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip K_Inc 10.10.0.0 255.255.0.0 dmz any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 51213, untranslate_hits = 40162&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: QOS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip FOS 192.168.177.0 255.255.255.0 K_Inc any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.177.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1857&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: QOS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (FOS,dmz) 192.168.177.0 192.168.177.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip FOS 192.168.177.0 255.255.255.0 dmz any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.177.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 14&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 74528300, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 15&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 192.168.177.10 using egress ifc FOS&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 0025.9027.a0ae hits 244&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: K_Inc&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: FOS&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As i said it is working, but I'm a little bit stumped as to why i had to create this acl to allow this traffic considering the same security traffic commands and sec levels.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278373#M310835</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-10-16T17:54:55Z</dc:date>
    </item>
    <item>
      <title>Phase8 NAT drops</title>
      <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278374#M310838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the original traffic wasnt blocked by ACL to begin with. It was dropped because of missing/incomplete NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you removed the ACL with the &lt;STRONG&gt;"no access-group &lt;ACL name=""&gt; in interface K_Inc"&lt;/ACL&gt;&lt;/STRONG&gt; command this should still work because of &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And because of the fact that the interfaces are both &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 18:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278374#M310838</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T18:10:51Z</dc:date>
    </item>
    <item>
      <title>Phase8 NAT drops</title>
      <link>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278375#M310840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Told you i was confused.&amp;nbsp; It was just the NATs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Removed the acl and it all continues to function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all i needed was:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (FOS,K_Inc) 192.168.177.0 192.168.177.0 netmask 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (K_Inc,FOS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're the best.&amp;nbsp; Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 19:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/phase8-nat-drops/m-p/2278375#M310840</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-10-16T19:08:41Z</dc:date>
    </item>
  </channel>
</rss>

