<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static-Nat-help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297715#M311272</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; test seems to go through just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would next try perhaps TCP Ping from the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping tcp 192.168.1.5 8000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should sen TCP SYN to the internal host and you should see if it replies on that port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you have also use the "netstat" command on the actual host (If windows host) command prompt to see if its listening on the mentioned port TCP/8000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Oct 2013 18:14:01 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-09T18:14:01Z</dc:date>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297712#M311269</link>
      <description>&lt;P&gt;am i missing anything ? can't seem to get it working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.5&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 70.60.200.200 service tcp 8000 8000 &lt;/P&gt;&lt;P&gt;access-group OUTSIDETOINSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDETOINSIDE extended permit tcp any host 192.168.1.5 eq 8000 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 5512 (8.6) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh nat:&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 (inside) to (outside) source static obj-192.168.1.5 70.60.100.200&amp;nbsp;&amp;nbsp; service tcp 8000 8000 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show local-host: &lt;/P&gt;&lt;P&gt;no entries for this nat statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks ??? &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297712#M311269</guid>
      <dc:creator>geraldchow1</dc:creator>
      <dc:date>2019-03-12T02:49:27Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297713#M311270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 70.60.200.200 8000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and post the output here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem that traffic has hit the NAT configurations. I guess it might even be a problem on the actual internal host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are you using Static PAT by the way? Or do you only have a few public IP addresses and cant afford to assign this public IP address to just this host 192.168.1.5?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297713#M311270</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-09T18:04:16Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297714#M311271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks JouniForss, yes we have a few public IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.5&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 70.60.200.200 service tcp 8000 8000 &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 70.60.200.200/8000 to 192.168.1.5/8000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-group OUTSIDETOINSIDE in interface outside&lt;/P&gt;&lt;P&gt;access-list OUTSIDETOINSIDE extended permit tcp any host 192.168.1.5 eq 8000 &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.5&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 70.60.200.200 service tcp 8000 8000 &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 15169948, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297714#M311271</guid>
      <dc:creator>geraldchow1</dc:creator>
      <dc:date>2013-10-09T18:10:07Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297715#M311272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; test seems to go through just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would next try perhaps TCP Ping from the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping tcp 192.168.1.5 8000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should sen TCP SYN to the internal host and you should see if it replies on that port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you have also use the "netstat" command on the actual host (If windows host) command prompt to see if its listening on the mentioned port TCP/8000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297715#M311272</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-09T18:14:01Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297716#M311273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pings are also sucessful. /8000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It isn't a windows host, it's a video appliance, and the 192.168.1.5:8000 url can be viewed from a web broswer from &lt;/P&gt;&lt;P&gt;an internal host on the same subnet and other internal subnets.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297716#M311273</guid>
      <dc:creator>geraldchow1</dc:creator>
      <dc:date>2013-10-09T18:20:47Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297717#M311274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest that you test the connection from the external network and check the &lt;STRONG&gt;"show access-list OUTSIDETOINSIDE"&lt;/STRONG&gt; output for the rule you have to allow the traffic and confirm that its getting increase in the hitcount.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is then you should confirm through the ASDM monitor/logging what happens to the connections. Do they end in &lt;STRONG&gt;"SYN Timeout"&lt;/STRONG&gt; or what do they show.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297717#M311274</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-09T18:42:41Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297718#M311275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Deny TCP (no connection) from 192.168.1.5/8000 to 34.240.16.79/16002 flags SYN ACK&amp;nbsp; on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are right !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 18:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297718#M311275</guid>
      <dc:creator>geraldchow1</dc:creator>
      <dc:date>2013-10-09T18:58:26Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297719#M311276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am not wrong that would seem like the TCP SYN has reached the device through some other external connection and the device now sends the TCP SYN ACK (part 2 of the 3 way handshake of TCP connection) to the ASA and ASA blocks it since it has not seen the original SYN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is there asymmetric routing happening here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:02:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297719#M311276</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-09T19:02:26Z</dc:date>
    </item>
    <item>
      <title>Static-Nat-help</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297720#M311277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This maybe true,. has the 192.168.1.0/24 subnet is vlan to and subinterface on the asa.&lt;/P&gt;&lt;P&gt;and then routes to back to cisco 3560&amp;nbsp; svi. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Oct 2013 19:23:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-help/m-p/2297720#M311277</guid>
      <dc:creator>geraldchow1</dc:creator>
      <dc:date>2013-10-09T19:23:26Z</dc:date>
    </item>
  </channel>
</rss>

