<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Some ICMP drop from inside to outside. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286553#M343175</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After upgrading from 8.4.x to 9.1.2 I got some drop in ICMP from inside to specific servers on Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping from a server or host on the inside I get the drop-reason nat-no-xlate-to-pat-pool with pacet tracer. If I ping from the ASA it works as I should.&lt;/P&gt;&lt;P&gt;Traffic going this way uses the default dynamic PAT: any - any -&amp;gt; outside interface &lt;/P&gt;&lt;P&gt;If I ping fex 8.8.8.8 there are no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know the meaning of this drop-reason?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Also tried 9.0.3 because of a VPN bug but the same result.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;act/SKL-FW1# sh cap CAP packet-number 3 trace detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 21:34:06.790425 001a.6ca5.02bf c464.1367.06ab 0x0800 Length: 74&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.22.10.12 &amp;gt; 84.17.x.x: icmp: echo request (ttl 127, id 21136)&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Mikael Gustafsson&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:36:43 GMT</pubDate>
    <dc:creator>Mikael Gustafsson</dc:creator>
    <dc:date>2019-03-12T02:36:43Z</dc:date>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286553#M343175</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After upgrading from 8.4.x to 9.1.2 I got some drop in ICMP from inside to specific servers on Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping from a server or host on the inside I get the drop-reason nat-no-xlate-to-pat-pool with pacet tracer. If I ping from the ASA it works as I should.&lt;/P&gt;&lt;P&gt;Traffic going this way uses the default dynamic PAT: any - any -&amp;gt; outside interface &lt;/P&gt;&lt;P&gt;If I ping fex 8.8.8.8 there are no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know the meaning of this drop-reason?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Also tried 9.0.3 because of a VPN bug but the same result.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;act/SKL-FW1# sh cap CAP packet-number 3 trace detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 21:34:06.790425 001a.6ca5.02bf c464.1367.06ab 0x0800 Length: 74&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.22.10.12 &amp;gt; 84.17.x.x: icmp: echo request (ttl 127, id 21136)&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Mikael Gustafsson&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286553#M343175</guid>
      <dc:creator>Mikael Gustafsson</dc:creator>
      <dc:date>2019-03-12T02:36:43Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286554#M343177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mikael, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the entire output of the packet-tracer ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the packet tracer involves any IP address on the ASA itself?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Sep 2013 19:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286554#M343177</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-11T19:24:23Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286555#M343180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats the strange part, this is the entire output of packet no 3.&amp;nbsp; (exept:&amp;nbsp; &lt;EM&gt;1 packet shown&lt;/EM&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 05:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286555#M343180</guid>
      <dc:creator>Mikael Gustafsson</dc:creator>
      <dc:date>2013-09-12T05:11:01Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286556#M343183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are trying to ping from &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.12.112.12 to&amp;nbsp; 84.17.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean those 2 IP addresses are public, are you trying to ping from the ASA outside interface to an outside host or do you have a public address range on your inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you write down a little diagram of what we are trying to do! cause it looks like you are trying to ping the IP address of the ASA (Used on PAT). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 05:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286556#M343183</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-12T05:19:21Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286557#M343185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Aa sorry, my try to obscure the IP, no need really &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So,&amp;nbsp; ping from inside, private IP range, to two servers on 84.17.x.x give me that error when capturing with trace&lt;/P&gt;&lt;P&gt;If I ping from ASA it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 07:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286557#M343185</guid>
      <dc:creator>Mikael Gustafsson</dc:creator>
      <dc:date>2013-09-12T07:33:01Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286558#M343187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mikael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are pinging 2 outside servers from the internal network? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are those 2 servers on the outside world or are they being used for a NAT statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet-tracer input inside icmp inside_host_ip 8 0&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;84.17.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Then provide us the output,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 15:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286558#M343187</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-12T15:24:25Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286559#M343189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both servers are on the outside. The serve as an outsourced service for the end customer, and to have some sort of monitoring they use Nagios and ping &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The result from simulated pacet tracer are the same as from packet tracer on the actual captured packet.&lt;/P&gt;&lt;P&gt;Do you have an explanation of the result, 'nat-no-xlate-to-pat-pool'? What does it mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;act/SKL-FW1# Packet-tracer input inside icmp 172.22.10.12 8 0&amp;nbsp; 84.17.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;act/SKL-FW1# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Sep 2013 07:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286559#M343189</guid>
      <dc:creator>Mikael Gustafsson</dc:creator>
      <dc:date>2013-09-13T07:09:58Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286560#M343191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mikael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a known issue in 9.x NAT behaviour. We cannot say it is bug, but it is a re-design for NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue occurs when request is made for non-mapped service on a host,&amp;nbsp; for which static identity NAT is configured along with service port&amp;nbsp; translation (either identity or non-identity). &lt;/P&gt;&lt;P&gt;For example, with following NAT rule:&lt;/P&gt;&lt;P&gt; object network MyServer&lt;/P&gt;&lt;P&gt; host 2.1.11.2&lt;/P&gt;&lt;P&gt; nat (outside,inside) static MyServer service tcp www 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Making&amp;nbsp; a request to the mapped (outside host) port 8080 from inside host works&amp;nbsp; fine; however request for other services on the outside server (such as&amp;nbsp; SMTP) doesn't go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make other services on the outside server&amp;nbsp; accessible, configure explicit NAT rule to allow the services. For&amp;nbsp; example, to allow access to HTTP as well as SMTP service on above&amp;nbsp; server, configure:&lt;/P&gt;&lt;P&gt; object network MyWWWServer&lt;/P&gt;&lt;P&gt; host 2.1.11.2&lt;/P&gt;&lt;P&gt; nat (outside,inside) static MyWWWServer service tcp www 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; object network MySMTPServer&lt;/P&gt;&lt;P&gt; host 2.1.11.2&lt;/P&gt;&lt;P&gt; nat (outside,inside) static MySMTPServer service tcp smtp 8025&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This issue has been documented in a &lt;STRONG&gt;DOC &lt;/STRONG&gt;bug, but it is still not available in Cisco.com bug toolkit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still cannot match the mentioned conditions to your nat config and figure out the&amp;nbsp; missing NAT. Please post your nat config here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;BR /&gt;Mashal Shboul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Sep 2013 12:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286560#M343191</guid>
      <dc:creator>malshbou</dc:creator>
      <dc:date>2013-09-13T12:41:16Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286561#M343193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mashal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understand right, to get ICMP to work I need an to create an extra NAT for just this translation?&lt;/P&gt;&lt;P&gt;Do you have an example?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Sep 2013 13:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286561#M343193</guid>
      <dc:creator>Mikael Gustafsson</dc:creator>
      <dc:date>2013-09-13T13:05:56Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286562#M343195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mikael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already mentioned an example.&lt;/P&gt;&lt;P&gt;I cannot accurately answer your question without seeing your NAT rules. But generally you need to add NAT rule to match the flow since one of the flow's IP addresses matches another xlate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------ &lt;BR /&gt;Mashal Shboul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Sep 2013 13:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286562#M343195</guid>
      <dc:creator>malshbou</dc:creator>
      <dc:date>2013-09-13T13:19:06Z</dc:date>
    </item>
    <item>
      <title>Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286563#M343196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I was thinking of an ICMP example.&lt;/P&gt;&lt;P&gt;And thoes servers I try to ping have both other sessions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;sh xlate&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;TCP PAT from outside:84.17.x.x&lt;/EM&gt;&amp;nbsp; and&lt;/P&gt;&lt;P&gt;&lt;EM&gt;NAT from outside:84.17.x.x&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get an error when I try to configure it. Both on object nat and manual NAT.&lt;/P&gt;&lt;P&gt;(probably me missing something here)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ERROR: real service object includes protocol that doesnt match TCP or UDP.&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Sep 2013 13:48:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286563#M343196</guid>
      <dc:creator>Mikael Gustafsson</dc:creator>
      <dc:date>2013-09-13T13:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286564#M343197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mashal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was not aware of that information &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the information. Kudos to U &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com" rel="nofollow"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Sep 2013 01:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286564#M343197</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-16T01:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Some ICMP drop from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286565#M343199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mashal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tested this last night and it's working now. &lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Sep 2013 05:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/some-icmp-drop-from-inside-to-outside/m-p/2286565#M343199</guid>
      <dc:creator>Mikael Gustafsson</dc:creator>
      <dc:date>2013-09-16T05:47:56Z</dc:date>
    </item>
  </channel>
</rss>

