<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505: Outbound SMTP Route Problem (rDNS) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341739#M344361</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Dynamic Policy PAT will NOT apply to any host which has Static NAT configuration. The Static NAT always overrides Dynamic NAT/PAT configuration and will always be used. So even if you configure Dynamic Policy PAT for outbound connectivity and a host has a Static NAT, it will always use the Static NAT IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, you already have normal Dynamic PAT which applies to the server which also have Static NAT configured. Yet, since Static NAT overrides Dynamic PAT/NAT it means that the servers will always use their Static NAT IP. (between the interfaces specified in the NAT configurations)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we look at the NAT existing NAT configurations there we can determine the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;NAT0 configuration on DMZ and INSIDE will always be matched before ANY other NAT configuration on the ASA&lt;/LI&gt;&lt;LI&gt;Dynamic Policy PAT (if added) will apply for all outbound SMTP traffic towards the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/LI&gt;&lt;LI&gt;All other traffic from both DMZ and INSIDE outbound to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; will use the interface IP address of &lt;STRONG&gt;"outside"&lt;/STRONG&gt; as their Dynamic PAT address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your VPN configuration it seems to be using &lt;STRONG&gt;Split Tunnel&lt;/STRONG&gt;. This means that you will only forward traffic towards your INSIDE and DMZ networks to the ASA through the VPN. Any connections towards any other destination IP address will use the local Internet connection of your client/host computer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So that in mind, the VPN Client (when connected) wont send any SMTP traffic that would come directly to ASA and which ASA would forward outbound through &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. This because only traffic destined to INSIDE and DMZ are coming from the VPN Client to the ASA, nothing headed to any public IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Aug 2013 22:12:27 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-08-20T22:12:27Z</dc:date>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341727#M344349</link>
      <description>&lt;P&gt;Hi All.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have seen a &lt;A _jive_internal="true" href="https://community.cisco.com/thread/2049405" target="_blank"&gt;similar issue&lt;/A&gt; but am not sure how to approach the problem given my setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The specific issue is that when any of the following occurs:&lt;/P&gt;&lt;P&gt;1) remote users connect/authenticate to the mail server over smtp&lt;/P&gt;&lt;P&gt;2) an internal app server relays outbound mail via mail server (both on DMZ)&lt;/P&gt;&lt;P&gt;3) a VPN user (me) port forwards localhost 25 of my laptop over SSH to send mail (i.e. workaround ISP blocking port 25)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then outbound smtp traffic is matched to the external IP of the ASA itself, and not the mail server. The end result is that there is a reverse DNS mismatch (rDNS exists on mail server domain, not ASA external IP) which is causing some remote mail servers to reject the mail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to have happen is for outbound smtp traffic to route via the external IP of the mail server by default. I am using object-groups, but can define manual access-list, static(dmz,outside) entries for each port if that is what is required to get this working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Applicable config:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;*************&lt;BR /&gt;object-group network web-services
network-object host xx.xxx.xx.101
network-object host xx.xxx.xx.102
...
object-group service open-tcp tcp
port-object eq smtp
...

access-list out_in extended permit tcp any object-group web-services object-group open-tcp
...
global (outside) 1 interface
global (dmz) 1 interface&lt;/CODE&gt;&lt;P&gt;nat (Inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.0.0 255.255.0.0
nat (dmz) 0 access-list nonat
nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;CODE&gt;...&lt;BR /&gt;&lt;BR /&gt;&lt;/CODE&gt;&lt;P&gt;static (dmz,outside) &lt;CODE&gt;xx.xxx.xx.&lt;/CODE&gt;101 172.16.20.2 netmask 255.255.255.255 &lt;/P&gt;static (dmz,outside) xx.xxx.xx.102 172.16.20.3 netmask 255.255.255.255&lt;BR /&gt;...&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;access-group out_in in interface outside&lt;/P&gt;route outside 0.0.0.0 0.0.0.0 xx.xxx.xx.97 1&lt;BR /&gt;*************&lt;BR /&gt;&lt;BR /&gt;Thanks for suggestions&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;﻿&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341727#M344349</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2019-03-12T02:28:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341728#M344350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that the problem is that your DMZ servers outbound connections wouldnt be visible with the public IP address configured in the &lt;STRONG&gt;"static"&lt;/STRONG&gt; NAT configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wondering as there arent really many things that should override Static NAT. Basically Static Policy NAT should do that BUT only if its before the Static NAT in order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command to confirm which translation is applied to certain traffic/packets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input dmz tcp &lt;SOURCE ip=""&gt; 12345 &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 14:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341728#M344350</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T14:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341729#M344351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, hi, thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mail flows in and out no problem. The issue is that in all 3 scenarios listed in my original post, outbound smtp traffic is bound to the external IP of the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see why this happens when connected over VPN, I port forward localhost 25 from my laptop over SSH. In this scenario I am sending mail directly from internal to external; there is no static routing rule for this, so the default routing policy (external IP of ASA) is used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same as VPN user above, when an internal app server relays via mail server, the traffic originates internally and therefore default routing policy takes precedence again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to prevent internally based smtp traffic from going out on external IP of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I need to figure out why remote users authenticating on the mail server at mail.clientsite.com, are also having outbound SMTP traffic sent out on external IP of ASA -- this traffic "should" be matched by static NAT rule and and go out on external IP of mail.clientsite.com.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would think there would be a way to force route all outbound smtp traffic via external IP of the mail server, no?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 15:00:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341729#M344351</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-20T15:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341730#M344352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting, packet tracer results in Allow action for phases 1-6, but a Drop action result in phase 7 for all DMZ addresses&lt;EM&gt; except &lt;/EM&gt;for default DMZ address 172.16.20.1 of the mail server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very strange that 172.16.20.1 would allow smtp traffic in/out since I have no static NAT rule in place on this address and port, only DNS server on port 53.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 16:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341730#M344352</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-20T16:11:23Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341731#M344353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, I am not sure if I get the whole picture even yet &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in general, if traffic is originating from the hosts which have Static NAT then the public IP address for outbound and inbound connections should always be the one in the Static NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have any other hosts that have outbound SMTP traffic for example and want to have that traffic also use the public IP addresses defined in the Static NAT configurations then you will have to configure some sort of Dynamic Policy PAT configurations just for the SMTP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above mentioned Dynamic Policy PAT configurations is very easy to configure. My problem at the moment is understanding exactly what hosts need to have this Dynamic Policy PAT performed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or maybe I have understood something completely wrong &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 16:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341731#M344353</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T16:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341732#M344354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't really go into much more detail, I've explained the situation as I understand it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe this will help though. Here I am sending mail from a client site email to my personal gmail account. This is what gmail receives:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;Return-Path: &lt;ADMIN&gt;
Received: from mymailserver.com (xx.xxx.xx.98.my.isp.com. [xx.xxx.xx.98])
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; by mx.google.com&lt;/ADMIN&gt;&lt;/PRE&gt;&lt;P&gt; So, .98 external IP above is default IP of the ASA; my ISP supplies a (useless) reverse DNS entry for this IP which has nothing to do with mymailserver.com with external IP on .101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gmail accepts the mail but some external mail servers are rejecting mail sent from our mail server due to a rDNS mismatch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Painful figuring this stuff out. I'd just like ALL outbound smtp traffic to be routed via external IP of our mail server (on .101) and NOT external IP of the ASA (on .98).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an idea how to pull this off, let me know &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 17:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341732#M344354</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-20T17:14:15Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341733#M344355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would require that I know a bit more about your setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would need to know&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What are the interfaces behind which hosts are located that need to show up as the Mail Server public IP when initiating outbound SMTP connections?&lt;/LI&gt;&lt;LI&gt;What are the IP addresses/networks of these hosts&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets take an example where I presume that we have a network 10.10.10.0/24 behind the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface and want to do Dynamic Policy PAT for the whole network when initiating outbound SMTP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-SMTP-POLICYPAT remark Outbound SMTP Policy PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-SMTP-POLICYPAT permit tcp 10.10.10.0 255.255.255.0 any eq smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 25 x.x.x.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 25 access-list INSIDE-SMTP-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above setup would apply to most of other cases. There would be some problems if there are host with Static NAT configured towards the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. In that case I am not sure if we could do this. Static NAT overrides Dynamic Policy PAT in the NAT ordering of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 17:27:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341733#M344355</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T17:27:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341734#M344356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmmm, thanks for the idea: how will dynamic PAT fly with object-groups and static NAT as listed in my original post?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My network consists of:&lt;/P&gt;&lt;P&gt;1) private vlan on 10.1.1.1 that VPN comes in on.&lt;/P&gt;&lt;P&gt;2) dmz vlan on 172.16.1.1&lt;/P&gt;&lt;P&gt;3) outside vlan on xx.xxx.xx.98 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All static NAT entries point from outside to private or dmz vlan; as far as I can tell there are no NAT entries pointing to the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my original post, I have:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;This entry looks like a catchall: &lt;/P&gt;&lt;PRE&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, looks like we may be getting closer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 19:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341734#M344356</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-20T19:10:43Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341735#M344357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would need to clarification related to the VPN you mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean that the ASA a VPN connection (either Client VPN or L2L VPN) from which you should be able to initiate outbound SMTP connections using the correct public NAT IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do you perhaps mean that there is some VPN device in addition to the ASA firewall which provides VPN connectivity (Client VPN or L2L VPN) from which you should be able to initiate outbound SMTP connections using the correct public NAT IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most important thing to know with regards to building the NAT configurations&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The interface &lt;STRONG&gt;"nameif"&lt;/STRONG&gt; of ALL the interfaces behind which hosts needing this NAT are located&lt;/LI&gt;&lt;LI&gt;All the networks/subnets behind those specific interface which need this NAT&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; question,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have the &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; configurations to both group the public NAT IP addresses of the Mail servers and a separate &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; to hold SMTP service. These are then used in the ACL that allows traffic to those servers. This ACL only applies to connection inbound from the public network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The interface ACL will have nothing to do with the connections the LAN hosts form outbound (as return traffic IS NOTmatched agains the WAN interface ACL)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, when building the Dynamic Policy PAT rules mentioned in my earlier post, you can use the &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; configurations to group source addresses/networks and services if needed for the actual Dynamic Policy PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 19:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341735#M344357</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T19:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341736#M344358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for hanging in there Jouni &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No separate VPN device, VPN provided by ASA itself, I VPN in on Inside 10.1.1.1 network below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network graph is simple (255.255.0.0 mask):&lt;/P&gt;&lt;P&gt;nameIf Inside&amp;nbsp;&amp;nbsp;&amp;nbsp; = 10.1.1.1&lt;/P&gt;&lt;P&gt;nameIf dmz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 172.16.1.1&lt;/P&gt;&lt;P&gt;nameIf outside&amp;nbsp; = xx.xxx.xx.98&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outbound mail on dmz for internal app servers and remote clients authenticating over smtp.&lt;/P&gt;&lt;P&gt;Outbound mail on Inside for VPN users (currently only me) that port forward localhost 25 over SSH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ servers live on 172.16.xx.xx 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, for example I have a Java app server on 172.16.40.1 which relays mail through mail server on 172.16.20.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be inclined to try the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-SMTP-POLICYPAT remark Outbound SMTP Policy PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-SMTP-POLICYPAT permit tcp 172.16.1.1 255.255.0.0 any eq smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 25 x.x.x.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz) 25 access-list INSIDE-SMTP-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the hope that all outbound smtp traffic bound to DMZ address range would be routed on .101 address of the mail server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the end I think part of the problem is that the mail server software sends out all relay clients on localhost, while ASA is expecting the traffic to come out on 172.16.20.2, 3, 4, etc. of target client domain, and therefore chooses default DMZ route as a fallback.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 20:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341736#M344358</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-20T20:44:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341737#M344359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have VPN Client configured on the ASA then those VPN Clients have their own VPN Pool network which has not yet been mentioned. With regards to ASAs routing, the routing table will view those VPN Client Pool IP addresses located behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface rather than the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your aim with the above configuration was to configure so that the whole DMZ networks outbound SMTP connections would be Dynamic PATed to the IP address x.x.x.101 then you have to make slight modification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Chance the ACL name of refer to the DMZ (only cosmetic meaning)&lt;/LI&gt;&lt;LI&gt;Change the source in the ACL to refer to the network address and mask&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-SMTP-POLICYPAT remark Outbound SMTP Policy PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-SMTP-POLICYPAT permit tcp 172.16.0.0 255.255.0.0 any eq smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 25 x.x.x.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz) 25 access-list DMZ-SMTP-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Dynamic Policy PAT configuration would only apply to hosts that DO NOT have Static NAT / Static Policy NAT configured (as it would override this NAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if your aim would also be to apply to the same Dynamic Policy PAT for the whole INSIDE network of 10.1.0.0/16 then you could add the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-SMTP-POLICYPAT remark Outbound SMTP Policy PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-SMTP-POLICYPAT permit tcp 10.1.0.0 255.255.0.0 any eq smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 25 access-list INSIDE-SMTP-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if the VPN Client users (localted behind &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface) also formed outbound SMTP connections through the ASA then this would mean the following things&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You would have to configure &lt;STRONG&gt;Full Tunnel&lt;/STRONG&gt; VPN where all traffic is forwarded through the VPN while its active&lt;/LI&gt;&lt;LI&gt;For traffic to come from the VPN Client to the ASA and head back out from the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface through the ASAs Internet connection you would need a similiar NAT configuration for the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface also and also an additional configuration to allow the traffic to enter and leave the same interface. This command is mentioned first below.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-SMTP-POLICYPAT remark Outbound SMTP Policy PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-SMTP-POLICYPAT permit tcp &lt;VPN pool="" network="" address=""&gt; &lt;NETWORK mask=""&gt; any eq smtp&lt;/NETWORK&gt;&lt;/VPN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside) 25 access-list OUTSIDE-SMTP-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What still throws me of is the fact that you mention something about using the SSH port for SMTP traffic? Yet I dont see any configuration referring to that. No other local network behind the ASA seems to be doing any sort of Static PAT to manipulate the port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again, I must just not have understood something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 21:05:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341737#M344359</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T21:05:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341738#M344360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, let me start with your last point first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm on the road a lot; most ISPs block outgoing smtp traffic and force you to have an email account in their system (e.g. &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:me@isp.com"&gt;me@isp.com&lt;/A&gt;&lt;SPAN&gt;). To get around this, &lt;/SPAN&gt;&lt;EM&gt;on my laptop&lt;/EM&gt;&lt;SPAN&gt; I connect to the mail server over SSH and port forward laptop localhost 25 to localhost port 25 of the mail server. This allows me to send outbound email as &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:me@mycompany.com"&gt;me@mycompany.com&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-SMTP-POLICYPAT remark Outbound SMTP Policy PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-SMTP-POLICYPAT permit tcp 172.16.0.0 255.255.0.0 any eq smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 25 x.x.x.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz) 25 access-list DMZ-SMTP-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This&amp;nbsp; Dynamic Policy PAT configuration would only apply to hosts that DO NOT&amp;nbsp; have Static NAT / Static Policy NAT configured (as it would override&amp;nbsp; this NAT)&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmmm, unless this only applies to outbound traffic, looks like it will interfere with my object-group services and static NAT mapping to dmz addresses as per this config that I have for several different external IPs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;PRE&gt;&lt;CODE&gt;object-group network web-services
network-object host xx.xxx.xx.101&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt; ...&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;object-group service open-tcp tcp
port-object eq smtp&lt;BR /&gt;port-object eq www&lt;BR /&gt;...&lt;/CODE&gt;&lt;BR /&gt;&lt;PRE&gt;&lt;CODE&gt;access-list out_in extended permit tcp any object-group web-services object-group open-tcp&lt;/CODE&gt;&lt;/PRE&gt;
&lt;PRE&gt;static (dmz,outside) &lt;CODE&gt;xx.xxx.xx.&lt;/CODE&gt;101 172.16.20.2 netmask 255.255.255.255
&lt;CODE&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What affect will adding your dynamic PAT below&lt;/P&gt;&lt;PRE&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 25 x.x.x.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz) 25 access-list DMZ-SMTP-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on my existing global, nat entries here?&lt;/P&gt;&lt;PRE&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I suppose I can give it a shot, just don't want to destroy a mostly functional network in the process &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN user can access both dmz and Inside networks -- VPN Config:&lt;/P&gt;&lt;P&gt;**************&lt;/P&gt;&lt;P&gt;access-list MyCompanyVPN_splitTunnelAcl standard permit 10.1.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list MyCompanyVPN_splitTunnelAcl standard permit 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;group-policy MyCompanyVPN internal&lt;/P&gt;&lt;P&gt;group-policy MyCompanyVPN attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value MyCompanyVPN_splitTunnelAcl&lt;/P&gt;&lt;P&gt;username someuser1 password ***** encrypted&lt;/P&gt;&lt;P&gt;username someuser2 password ***** encrypted&lt;/P&gt;&lt;P&gt;tunnel-group MyCompanyVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group&amp;nbsp; MyCompanyVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool RemoteClientsPool&lt;/P&gt;&lt;P&gt; default-group-policy MyCompanyVPN&lt;/P&gt;&lt;P&gt;tunnel-group MyCompanyVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;******************&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 21:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341738#M344360</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-20T21:50:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341739#M344361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Dynamic Policy PAT will NOT apply to any host which has Static NAT configuration. The Static NAT always overrides Dynamic NAT/PAT configuration and will always be used. So even if you configure Dynamic Policy PAT for outbound connectivity and a host has a Static NAT, it will always use the Static NAT IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, you already have normal Dynamic PAT which applies to the server which also have Static NAT configured. Yet, since Static NAT overrides Dynamic PAT/NAT it means that the servers will always use their Static NAT IP. (between the interfaces specified in the NAT configurations)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we look at the NAT existing NAT configurations there we can determine the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;NAT0 configuration on DMZ and INSIDE will always be matched before ANY other NAT configuration on the ASA&lt;/LI&gt;&lt;LI&gt;Dynamic Policy PAT (if added) will apply for all outbound SMTP traffic towards the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/LI&gt;&lt;LI&gt;All other traffic from both DMZ and INSIDE outbound to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; will use the interface IP address of &lt;STRONG&gt;"outside"&lt;/STRONG&gt; as their Dynamic PAT address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your VPN configuration it seems to be using &lt;STRONG&gt;Split Tunnel&lt;/STRONG&gt;. This means that you will only forward traffic towards your INSIDE and DMZ networks to the ASA through the VPN. Any connections towards any other destination IP address will use the local Internet connection of your client/host computer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So that in mind, the VPN Client (when connected) wont send any SMTP traffic that would come directly to ASA and which ASA would forward outbound through &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. This because only traffic destined to INSIDE and DMZ are coming from the VPN Client to the ASA, nothing headed to any public IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 22:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341739#M344361</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T22:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341740#M344362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, thanks for all the detail here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am seeing the reverse DNS mismatch in all 3 scenarios listed in original email (connected over vpn; dmz app server relay through mail server; remote user authenticate to mail server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see that the mail server itself sends all outbound traffic on localhost (127.0.0.1) which is on the primary server NIC, eth0. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What must be happening is that inbound smtp traffic comes in correctly based on static NAT rule (e.g. 172.16.20.3), but then goes out from the mail server on ASA default DMZ address, 172.16.1.1, which of course routes to external IP of the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since static NAT overrides dynamic PAT I'm not sure what I can do. Perhaps I can remove static NAT for smtp traffic entirely and then PAT inbound smtp traffic to mail server DMZ address, and PAT outbound all smtp traffic to external IP of the mail server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if that will break things &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 23:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341740#M344362</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-20T23:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341741#M344363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASAs interface IP address is 172.16.1.1 then NO SMTP traffic will be originated from its interface IP address (as this is traffic generated by hosts/server). The IP address 172.16.1.1 in that case would only be the next hop/default gateway for the DMZ servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having the Static NAT for the actual DMZ Mail Server and Dynamic Policy PAT to the same public IP address for outbound SMTP connections should mean that absolutely no internal host should be using the ASA &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address as the PAT IP address for outbound SMTP connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If outbound SMTP connections are visible to the public network with the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address then it simply means that the connections are hitting the normal Dynamic PAT rule mentioned below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have the above Dynamic PAT and the new Dynamic Policy PAT configured then the Dynamic Policy PAT will override the Dynamic PAT. And as mentioned before, this applies only for outbound SMTP traffic. All other outbound traffic uses the above configuration for Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also confirm the translations done to certain connections with the&lt;STRONG&gt; "packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The general format is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;SOURCE interface=""&gt; tcp &lt;SOURCE ip=""&gt; 12345 &lt;DESTINATION ip=""&gt; 25&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where the &lt;SOURCE interface=""&gt; is the interface behind which the host is located.&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 23:13:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341741#M344363</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T23:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341742#M344364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm going to try this in a little while, Jouni, will let you know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marking this as the correct answer seeing as you've given 10 answers in 1 &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 00:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341742#M344364</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-21T00:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341743#M344365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Whoo hooo, you networking genius, works like a charm &lt;IMG ___jive_emoticon_name="cool" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" /&gt;&lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, this was a tough problem to tackle, wish I could mark question as answered a hundred times.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 01:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341743#M344365</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-21T01:10:30Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341744#M344366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear its working &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, it did take some more effort to go through the setup and&amp;nbsp; determine what was needed to accomplish the required result. Though those are usually the situations where you learn the most. One of the reasons I am participating here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you want you can always rate any answer that you have felt has been helpfull. You can even mark several answers as the correct answer if you wanted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 06:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341744#M344366</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-21T06:17:36Z</dc:date>
    </item>
    <item>
      <title>ASA 5505: Outbound SMTP Route Problem (rDNS)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341745#M344367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, I have marked applicable answers as correct, and starred others accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great work, have this page bookmarked, nice reference guide for understanding static NAT and dynamic PAT relationship.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again, you're a networking master &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 11:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-outbound-smtp-route-problem-rdns/m-p/2341745#M344367</guid>
      <dc:creator>newmindeye</dc:creator>
      <dc:date>2013-08-21T11:05:54Z</dc:date>
    </item>
  </channel>
</rss>

