<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5505 NAT issues. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330644#M342850</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you are probably running into a problem where the Section 1 Manual NAT for the Site B Dynamic PAT is overriding the Static PAT for the exchange server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest changing the Dynamic PAT for the Site B LAN to Section 3 Manual NAT rules by introducing the parameter &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; to the configuration. This Dynamic PAT configuration doesnt need to be at such a high priority&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (outside,outside) source dynamic obj-192.168.1.0 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) after-auto source dynamic obj-192.168.1.0 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure why changing the source interface as &lt;STRONG&gt;"any"&lt;/STRONG&gt; has any effect on this situation. But it seems like the order of the NAT rules might be the reason for the initial problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because an incoming connection to the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; IP address with SMTP matches the Manual NAT rule and doesnt even check the SMTP Static PAT configured with Auto NAT in Section 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I was to try determine the reason why the &lt;STRONG&gt;"any"&lt;/STRONG&gt; source interface made a different I would have to actually lab this setup and check some outputs from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Sep 2013 09:53:06 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-09-17T09:53:06Z</dc:date>
    <item>
      <title>ASA5505 NAT issues.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330643#M342849</link>
      <description>&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;I have a site 2 site setup.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;(10.10.10.1/24 )Site A &amp;lt;-&amp;gt; Site B (192.168.1.0/24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;On site B I have a webserver and it is being NAT'ted on the outside of Site A this part works like a charm with this nat rule.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="color: #ff0000;"&gt;nat (outside,outside) source static obj-192.168.1.10 obj-pubilcwebserverip&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;The reason for this choice lies with where my extra public IP addreses are located.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;Now here is the problem.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;I want to hide the rest of Site B behind Site A firewall and crated this NAT rule.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="color: #ff0000;"&gt;nat (outside,outside) source dynamic obj-192.168.1.0 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;The above rule blocks for access to a mail server on Site A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;This is the config for the mail server on Site A and it's using the outside IP address of Site A for the NAT.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="color: #ff0000;"&gt;object network EXCHSERVER&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="color: #ff0000;"&gt; nat (inside,outside) static interface service tcp smtp smtp&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;If i change the blocking NAT rule as shown below everthing is working fine.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="color: #ff0000;"&gt;nat (&lt;SPAN style="color: #0000ff;"&gt;any&lt;/SPAN&gt;,outside) source dynamic obj-192.168.1.0 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;1. So why does the outside part block it?&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;2. Why does it make a difference any or outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;Fyi. The Site B NAT rule is just above the mail NAT rule since the mail NAT rules is an automatic NAT rule.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Any help will be much appreciated&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;//Brian&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330643#M342849</guid>
      <dc:creator>Brian Korfitz Miehs</dc:creator>
      <dc:date>2019-03-12T02:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 NAT issues.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330644#M342850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you are probably running into a problem where the Section 1 Manual NAT for the Site B Dynamic PAT is overriding the Static PAT for the exchange server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest changing the Dynamic PAT for the Site B LAN to Section 3 Manual NAT rules by introducing the parameter &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; to the configuration. This Dynamic PAT configuration doesnt need to be at such a high priority&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (outside,outside) source dynamic obj-192.168.1.0 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) after-auto source dynamic obj-192.168.1.0 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure why changing the source interface as &lt;STRONG&gt;"any"&lt;/STRONG&gt; has any effect on this situation. But it seems like the order of the NAT rules might be the reason for the initial problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because an incoming connection to the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; IP address with SMTP matches the Manual NAT rule and doesnt even check the SMTP Static PAT configured with Auto NAT in Section 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I was to try determine the reason why the &lt;STRONG&gt;"any"&lt;/STRONG&gt; source interface made a different I would have to actually lab this setup and check some outputs from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Sep 2013 09:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330644#M342850</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-17T09:53:06Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT issues.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330645#M342851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Hi Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;Thank you for the fast reply &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;I already solved the initial problem but thank you for the input.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;The thing is why two different NAT rules overlap even thou they are about different networks.&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;Mail NAT rule is regarding a 10.x.x.x network and Site B is 192.168.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; //Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Sep 2013 10:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330645#M342851</guid>
      <dc:creator>Brian Korfitz Miehs</dc:creator>
      <dc:date>2013-09-17T10:44:41Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT issues.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330646#M342852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They overlap because of the use of &lt;STRONG&gt;"interface"&lt;/STRONG&gt; parameter. In other words you are using the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address for both the Static PAT and Dynamic PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when we consider that the Dynamic PAT is in Section 1 above the Static PAT in Section 2 this means that traffic destined to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address from the 192.168.1.0/24 network will match the Section 1 Dynamic PAT rather than the Section 2 Static PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet arriving on the ASA sees tha the destination IP address is the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address. It will also see that the traffic is souce from 192.168.1.0/24 and the source interface is also &lt;STRONG&gt;"outside"&lt;/STRONG&gt; therefore it matches the Dynamic PAT rule rather than the Static PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets take a simple example from my home firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I for example have the following configurations for testing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (LAN,WAN) static interface service udp 3389 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,WAN) after-auto source dynamic LAN-NETWORK interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, I have a Section 2 Static PAT and Section 3 Dynamic PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets look what a&lt;STRONG&gt; "packet-tracer"&lt;/STRONG&gt; towards my &lt;STRONG&gt;"WAN"&lt;/STRONG&gt; interface IP address on port TCP/3389 would look like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA# packet-tracer input WAN tcp 1.1.1.1 12345 x.x.x.x 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;MAC Access list&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: UN-NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: static&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (LAN,WAN) static interface service tcp 3389 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT divert to egress interface LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Untranslate x.x.x.x/3389 to 10.0.0.200/3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As we can see, the simulated packet would match our Static PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets change the setup to be similiar to your problem situation. Lets move my Dynamic PAT from Section 3 to Section 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (LAN,WAN) static interface service udp 3389 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,WAN) source dynamic LAN-NETWORK interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets take the same &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA# packet-tracer input WAN tcp 1.1.1.1 12345 x.x.x.x 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: input&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;in&amp;nbsp;&amp;nbsp; x.x.x.x&amp;nbsp; 255.255.255.255 identity&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: input&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: per-session&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;input-interface: WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;output-interface: NP Identity Ifc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see the simulated packet wont match the Static PAT rule anymore. Granted, the output doesnt really indicate we matched the Dynamic PAT rule but that is what happens. Since the Dynamic PAT rule is matched first the Static PAT will not be applied and the connection fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Changing the Dynamic PAT vs. Static PAT order back to the original corrects the situation and everything works as usual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Sep 2013 10:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330646#M342852</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-17T10:58:03Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT issues.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330647#M342853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It sure did, thank you very much &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A bit annoying since i made this error on a customers firewall and this "feature" multiplied my error to wtfpwn level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Sep 2013 13:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/2330647#M342853</guid>
      <dc:creator>Brian Korfitz Miehs</dc:creator>
      <dc:date>2013-09-17T13:51:44Z</dc:date>
    </item>
  </channel>
</rss>

