<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic unable to configure static nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279013#M345337</link>
    <description>&lt;P&gt;Hi, i am totally new to ASA, can someone help me out with Static NAT translation? what i am trying to do here is translate an inside address to an outside address to allow our video conference equipment to be access from the outside.&amp;nbsp; I thought i had all the setting correct, but i keep hitting the "Implicit deny rule" when tracing from packet-tracer. I have even try to add allow any any and it would still be deny.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the red highlight is what i have entered. after what i have entered, i am still unable to ping the global address (external address) from the internet.&amp;nbsp;&amp;nbsp;&amp;nbsp; am i missing something in the global statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&amp;nbsp; along with the packet-tracer trace:&lt;/P&gt;&lt;P&gt;bvvpn# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(2)&lt;BR /&gt;!&lt;BR /&gt;hostname bvvpn&lt;BR /&gt;domain-name printronix.com&lt;BR /&gt;enable password Q1.OQcJ/6fqsxv3R encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description DMZ&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.254.88.1 255.255.255.0&lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.254.32.250 255.255.224.0&lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;description 50mbit fiber optic line&lt;BR /&gt;nameif Outside10&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 87.213.234.130 255.255.255.248&lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ospf cost 10&lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;passwd GtIZCFM9KgO1EscB encrypted&lt;BR /&gt;boot system disk0:/asa722-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns domain-lookup Outside10&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.254.41.28&lt;BR /&gt;name-server 194.151.228.18&lt;BR /&gt;name-server 194.151.228.34&lt;BR /&gt;domain-name printronix.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network MAILDMZ&lt;BR /&gt;description Ports for OWA DMZ&lt;BR /&gt;//omited//&lt;BR /&gt;object-group network DowloadSiteFTP&lt;BR /&gt;//omited//&lt;BR /&gt;object-group network BVMonitoring&lt;BR /&gt;//omited//&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group service video_conference tcp-udp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;description tcp-udp ports for Lifesize video conference&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1720&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 60000 64999&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 3230 3235&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group service video_conference_tcp tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;description tcp ports used for Lifesize video conference&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 60000 64999&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq h323&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1503&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1731&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 3230 3235&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 1718 1719&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1002&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range sip 5061&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group network video_conference_endpoints&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;network-object host 87.213.234.132&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group service video_conference_udp udp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;description udp ports used for Lifesize video conference&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq sip&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 3230 3235&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 1718 1719&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 60000 64999&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq www&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip host 172.31.255.33 host 172.31.255.1&lt;BR /&gt;access-list Inside_nat0_outbound remark Midl_3PL&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 192.168.60.0 255.255.255.0&lt;BR /&gt;access-list Inside_pnat_outbound_V1 extended permit ip 10.0.0.0 255.0.0.0 any&lt;BR /&gt;access-list BV standard permit 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any echo&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any unreachable&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any time-exceeded&lt;BR /&gt;access-list Outside10_access_in extended permit tcp any interface Outside10 eq https&lt;BR /&gt;access-list Outside10_access_in extended permit tcp any interface Outside10 eq www&lt;BR /&gt;access-list Outside10_access_in extended permit ip 10.254.33.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list Outside10_access_in extended permit ip 10.254.96.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list Outside10_access_in extended permit tcp any object-group video_conference_tcp object-group video_conference_endpoints object-group video_conference_tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list Outside10_access_in extended permit udp any object-group video_conference_udp object-group video_conference_endpoints object-group video_conference_udp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list Outside10_access_in extended permit icmp any object-group video_conference_endpoints&lt;/SPAN&gt;&lt;BR /&gt;access-list Inside_access_out extended permit icmp any any echo&lt;BR /&gt;access-list Inside_access_out extended permit icmp any any&lt;BR /&gt;access-list Inside_access_out extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list DMZ_nat_outbound extended permit ip 10.254.88.0 255.255.255.0 interface Inside&lt;BR /&gt;access-list DMZ_access_in remark To BVSQL&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 host 10.254.41.32 eq 1433&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group MAILDMZ echo-reply&lt;BR /&gt;access-list DMZ_access_in remark DFS?&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq 4958&lt;BR /&gt;access-list DMZ_access_in remark SQL 2005 Express 2&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 host 10.1.3.13 eq 1434&lt;BR /&gt;access-list DMZ_access_in remark Allow for DFSR Traffic&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 gt 1024 object-group DowloadSiteFTP gt 1024&lt;BR /&gt;access-list DMZ_access_in remark LDAP Traffic&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq ldap&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group DowloadSiteFTP echo&lt;BR /&gt;access-list DMZ_access_in remark DFS Traffic&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq 135&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 eq ntp host 10.254.41.30 eq ntp&lt;BR /&gt;access-list DMZ_access_in remark Alle echo ICMP&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group MAILDMZ echo&lt;BR /&gt;access-list DMZ_access_in remark Allow ping from BVMIS to monitor&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group BVMonitoring echo-reply&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq https&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 691&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq ldap&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq 389&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 3268&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 88&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq 88&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq domain&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq domain&lt;BR /&gt;access-list DMZ_access_in extended permit ip host 10.254.88.10 interface Outside10&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 135&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ range 1024 1050&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq netbios-ssn&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq netbios-ns&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 445&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq www&lt;BR /&gt;access-list DMZ_access_in remark AutomaticUpdates&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 host 10.254.41.3 eq www&lt;BR /&gt;access-list DMZ_access_in remark SQL&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq 1433&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq smtp&lt;BR /&gt;access-list DMZ_access_in extended permit ip 10.0.0.0 255.0.0.0 host 10.254.88.10 inactive&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 eq telnet object-group MAILDMZ&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq ftp&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq nntp&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 eq smtp object-group MAILDMZ&lt;BR /&gt;access-list DMZ_nat_outbound_1 extended permit ip host 10.254.88.10 interface Outside10&lt;BR /&gt;access-list DMZ_access_out extended permit udp host 10.254.41.30 eq netbios-ns host 10.254.88.10 eq netbios-ns&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group MAILDMZ eq ldap host 10.254.88.10&lt;BR /&gt;access-list DMZ_access_out extended permit icmp object-group MAILDMZ host 10.254.88.10 echo&lt;BR /&gt;access-list DMZ_access_out remark Allow for DFSR Traffic&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP gt 1024 host 10.254.88.10 eq 4900&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP eq 4584 host 10.254.88.10 gt 1024&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP host 10.254.88.10 eq 135&lt;BR /&gt;access-list DMZ_access_out remark Allow retieving of event logs from BVMIS&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group BVMonitoring host 10.254.88.10&lt;BR /&gt;access-list DMZ_access_out remark Allow Echo reply&lt;BR /&gt;access-list DMZ_access_out extended permit icmp object-group MAILDMZ host 10.254.88.10 echo-reply&lt;BR /&gt;access-list DMZ_access_out remark Allow ping from BVMIS to monitor&lt;BR /&gt;access-list DMZ_access_out extended permit icmp object-group BVMonitoring host 10.254.88.10 echo&lt;BR /&gt;access-list DMZ_access_out remark DFS for downloadsystem&lt;BR /&gt;access-list DMZ_access_out extended permit udp object-group DowloadSiteFTP eq netbios-ns host 10.254.88.10 eq netbios-ns&lt;BR /&gt;access-list DMZ_access_out remark DFS for downloadsystem&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP host 10.254.88.10 eq netbios-ssn&lt;BR /&gt;access-list DMZ_access_out remark DFS for downloadsystem&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP host 10.254.88.10 eq 445&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group MAILDMZ host 10.254.88.10 eq smtp&lt;BR /&gt;access-list DMZ_access_out extended permit tcp any host 10.254.88.10 eq www&lt;BR /&gt;access-list DMZ_access_out extended permit tcp any host 10.254.88.10 eq https&lt;BR /&gt;access-list DMZ_access_out remark Allow all trafic&lt;BR /&gt;access-list DMZ_access_out extended permit ip host 10.254.33.1 host 10.254.88.10&lt;BR /&gt;access-list DMZ_nat0_outbound extended permit ip 10.254.88.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list DMZ_mpc remark Outgoing HTTP Traffic&lt;BR /&gt;access-list DMZ_mpc extended permit tcp host 10.254.88.10 eq www any&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.32.0 255.255.224.0 10.254.96.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.96.0 255.255.255.0 10.254.32.0 255.255.224.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.64.0 255.255.224.0 10.254.96.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.96.0 255.255.255.0 10.254.64.0 255.255.224.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.97.0 255.255.255.0 10.254.96.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.96.0 255.255.255.0 10.254.97.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended permit ip 10.254.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list HOLVPN extended permit gre host 172.31.255.33 host 172.31.255.1&lt;BR /&gt;access-list Default webtype permit tcp host 10.252.41.1 log default&lt;BR /&gt;pager lines 40&lt;BR /&gt;//omited//&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu Outside10 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool Roaming 10.254.96.2-10.254.96.254 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface DMZ&lt;BR /&gt;ip audit attack action alarm drop&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-522.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Inside) 1 interface&lt;BR /&gt;global (Outside10) 5 interface&lt;BR /&gt;nat (DMZ) 0 access-list DMZ_nat0_outbound&lt;BR /&gt;nat (DMZ) 5 access-list DMZ_nat_outbound_1&lt;BR /&gt;nat (DMZ) 1 access-list DMZ_nat_outbound outside&lt;BR /&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;BR /&gt;nat (Inside) 5 access-list Inside_pnat_outbound_V1&lt;BR /&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,Outside10) tcp interface https 10.254.88.10 https netmask 255.255.255.255&lt;BR /&gt;static (DMZ,Outside10) tcp interface www 10.254.88.10 www netmask 255.255.255.255&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;static (Inside,Outside10) 87.213.234.132 10.254.97.240 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group DMZ_access_out out interface DMZ&lt;BR /&gt;access-group Inside_access_out out interface Inside&lt;BR /&gt;access-group Outside10_access_in in interface Outside10&lt;/P&gt;&lt;P&gt;route Inside 10.224.0.0 255.224.0.0 10.254.32.254 1&lt;BR /&gt;route Inside 10.254.0.0 255.255.0.0 10.254.32.254 1&lt;BR /&gt;route Inside 172.31.255.33 255.255.255.255 10.254.32.254 1&lt;BR /&gt;route Inside 10.0.0.0 255.0.0.0 10.254.32.254 1&lt;BR /&gt;route Outside10 0.0.0.0 0.0.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.249.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.250.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.252.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.251.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.254.96.0 255.255.255.0 87.213.234.129 1&lt;BR /&gt;route Outside10 172.31.255.1 255.255.255.255 87.213.234.129 1&lt;BR /&gt;////omited////&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access Inside&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map OutgoingHTTP&lt;BR /&gt;match access-list DMZ_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;policy-map DMZ-policy&lt;BR /&gt;class OutgoingHTTP&lt;BR /&gt;&amp;nbsp; police input 6000000 100000&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy DMZ-policy interface DMZ&lt;BR /&gt;ntp server 10.254.41.30&lt;/P&gt;&lt;P&gt;ssl trust-point BV Outside10&lt;/P&gt;&lt;P&gt;smtp-server 10.254.41.24&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:adc66f358665cdffc56d24e15b03444c&lt;BR /&gt;: end&lt;BR /&gt;bvvpn#&lt;BR /&gt;bvvpn#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from Packet-tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bvvpn# pac i o tcp 4.2.2.2 80 87.213.234.132 80 det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Outside10) 87.213.234.132 10.254.97.240 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip Inside host 10.254.97.240 Outside10 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 87.213.234.132&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 12178&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 87.213.234.132/0 to 10.254.97.240/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside10_access_in in interface Outside10&lt;BR /&gt;access-list Outside10_access_in extended permit tcp any object-group video_conference_tcp object-group video_conference_endpoints object-group video_conference_tcp&lt;BR /&gt;object-group service video_conference_tcp tcp&lt;BR /&gt;description: tcp ports used for Lifesize video conference&lt;BR /&gt;port-object range 60000 64999&lt;BR /&gt;port-object eq h323&lt;BR /&gt;port-object eq 1503&lt;BR /&gt;port-object eq 1731&lt;BR /&gt;port-object range 3230 3235&lt;BR /&gt;port-object range 1718 1719&lt;BR /&gt;port-object eq 1002&lt;BR /&gt;port-object range sip 5061&lt;BR /&gt;port-object eq www&lt;BR /&gt;object-group network video_conference_endpoints&lt;BR /&gt;network-object host 87.213.234.132&lt;BR /&gt;object-group service video_conference_tcp tcp&lt;BR /&gt;description: tcp ports used for Lifesize video conference&lt;BR /&gt;port-object range 60000 64999&lt;BR /&gt;port-object eq h323&lt;BR /&gt;port-object eq 1503&lt;BR /&gt;port-object eq 1731&lt;BR /&gt;port-object range 3230 3235&lt;BR /&gt;port-object range 1718 1719&lt;BR /&gt;port-object eq 1002&lt;BR /&gt;port-object range sip 5061&lt;BR /&gt;port-object eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0x926ff58, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14, user_data=0x926ff18, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=87.213.234.132, mask=255.255.255.255, port=80&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0x3bfcea8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=43497450, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x3d9b050, priority=11, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=265, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside10&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;bvvpn#&lt;BR /&gt;bvvpn#&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:20:19 GMT</pubDate>
    <dc:creator>Allan Choo</dc:creator>
    <dc:date>2019-03-12T02:20:19Z</dc:date>
    <item>
      <title>unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279013#M345337</link>
      <description>&lt;P&gt;Hi, i am totally new to ASA, can someone help me out with Static NAT translation? what i am trying to do here is translate an inside address to an outside address to allow our video conference equipment to be access from the outside.&amp;nbsp; I thought i had all the setting correct, but i keep hitting the "Implicit deny rule" when tracing from packet-tracer. I have even try to add allow any any and it would still be deny.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the red highlight is what i have entered. after what i have entered, i am still unable to ping the global address (external address) from the internet.&amp;nbsp;&amp;nbsp;&amp;nbsp; am i missing something in the global statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&amp;nbsp; along with the packet-tracer trace:&lt;/P&gt;&lt;P&gt;bvvpn# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(2)&lt;BR /&gt;!&lt;BR /&gt;hostname bvvpn&lt;BR /&gt;domain-name printronix.com&lt;BR /&gt;enable password Q1.OQcJ/6fqsxv3R encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description DMZ&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.254.88.1 255.255.255.0&lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.254.32.250 255.255.224.0&lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;description 50mbit fiber optic line&lt;BR /&gt;nameif Outside10&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 87.213.234.130 255.255.255.248&lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ospf cost 10&lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;passwd GtIZCFM9KgO1EscB encrypted&lt;BR /&gt;boot system disk0:/asa722-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns domain-lookup Outside10&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.254.41.28&lt;BR /&gt;name-server 194.151.228.18&lt;BR /&gt;name-server 194.151.228.34&lt;BR /&gt;domain-name printronix.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network MAILDMZ&lt;BR /&gt;description Ports for OWA DMZ&lt;BR /&gt;//omited//&lt;BR /&gt;object-group network DowloadSiteFTP&lt;BR /&gt;//omited//&lt;BR /&gt;object-group network BVMonitoring&lt;BR /&gt;//omited//&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group service video_conference tcp-udp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;description tcp-udp ports for Lifesize video conference&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1720&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 60000 64999&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 3230 3235&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group service video_conference_tcp tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;description tcp ports used for Lifesize video conference&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 60000 64999&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq h323&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1503&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1731&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 3230 3235&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 1718 1719&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq 1002&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range sip 5061&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group network video_conference_endpoints&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;network-object host 87.213.234.132&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;object-group service video_conference_udp udp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;description udp ports used for Lifesize video conference&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq sip&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 3230 3235&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 1718 1719&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object range 60000 64999&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;port-object eq www&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip host 172.31.255.33 host 172.31.255.1&lt;BR /&gt;access-list Inside_nat0_outbound remark Midl_3PL&lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 192.168.60.0 255.255.255.0&lt;BR /&gt;access-list Inside_pnat_outbound_V1 extended permit ip 10.0.0.0 255.0.0.0 any&lt;BR /&gt;access-list BV standard permit 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any echo&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any unreachable&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any time-exceeded&lt;BR /&gt;access-list Outside10_access_in extended permit tcp any interface Outside10 eq https&lt;BR /&gt;access-list Outside10_access_in extended permit tcp any interface Outside10 eq www&lt;BR /&gt;access-list Outside10_access_in extended permit ip 10.254.33.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list Outside10_access_in extended permit ip 10.254.96.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list Outside10_access_in extended permit tcp any object-group video_conference_tcp object-group video_conference_endpoints object-group video_conference_tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list Outside10_access_in extended permit udp any object-group video_conference_udp object-group video_conference_endpoints object-group video_conference_udp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list Outside10_access_in extended permit icmp any object-group video_conference_endpoints&lt;/SPAN&gt;&lt;BR /&gt;access-list Inside_access_out extended permit icmp any any echo&lt;BR /&gt;access-list Inside_access_out extended permit icmp any any&lt;BR /&gt;access-list Inside_access_out extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list DMZ_nat_outbound extended permit ip 10.254.88.0 255.255.255.0 interface Inside&lt;BR /&gt;access-list DMZ_access_in remark To BVSQL&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 host 10.254.41.32 eq 1433&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group MAILDMZ echo-reply&lt;BR /&gt;access-list DMZ_access_in remark DFS?&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq 4958&lt;BR /&gt;access-list DMZ_access_in remark SQL 2005 Express 2&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 host 10.1.3.13 eq 1434&lt;BR /&gt;access-list DMZ_access_in remark Allow for DFSR Traffic&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 gt 1024 object-group DowloadSiteFTP gt 1024&lt;BR /&gt;access-list DMZ_access_in remark LDAP Traffic&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq ldap&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group DowloadSiteFTP echo&lt;BR /&gt;access-list DMZ_access_in remark DFS Traffic&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq 135&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 eq ntp host 10.254.41.30 eq ntp&lt;BR /&gt;access-list DMZ_access_in remark Alle echo ICMP&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group MAILDMZ echo&lt;BR /&gt;access-list DMZ_access_in remark Allow ping from BVMIS to monitor&lt;BR /&gt;access-list DMZ_access_in extended permit icmp host 10.254.88.10 object-group BVMonitoring echo-reply&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq https&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 691&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq ldap&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq 389&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 3268&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 88&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq 88&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq domain&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq domain&lt;BR /&gt;access-list DMZ_access_in extended permit ip host 10.254.88.10 interface Outside10&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 135&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ range 1024 1050&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq netbios-ssn&lt;BR /&gt;access-list DMZ_access_in extended permit udp host 10.254.88.10 object-group MAILDMZ eq netbios-ns&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq 445&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq www&lt;BR /&gt;access-list DMZ_access_in remark AutomaticUpdates&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 host 10.254.41.3 eq www&lt;BR /&gt;access-list DMZ_access_in remark SQL&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq 1433&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq smtp&lt;BR /&gt;access-list DMZ_access_in extended permit ip 10.0.0.0 255.0.0.0 host 10.254.88.10 inactive&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 eq telnet object-group MAILDMZ&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group DowloadSiteFTP eq ftp&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 object-group MAILDMZ eq nntp&lt;BR /&gt;access-list DMZ_access_in extended permit tcp host 10.254.88.10 eq smtp object-group MAILDMZ&lt;BR /&gt;access-list DMZ_nat_outbound_1 extended permit ip host 10.254.88.10 interface Outside10&lt;BR /&gt;access-list DMZ_access_out extended permit udp host 10.254.41.30 eq netbios-ns host 10.254.88.10 eq netbios-ns&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group MAILDMZ eq ldap host 10.254.88.10&lt;BR /&gt;access-list DMZ_access_out extended permit icmp object-group MAILDMZ host 10.254.88.10 echo&lt;BR /&gt;access-list DMZ_access_out remark Allow for DFSR Traffic&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP gt 1024 host 10.254.88.10 eq 4900&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP eq 4584 host 10.254.88.10 gt 1024&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP host 10.254.88.10 eq 135&lt;BR /&gt;access-list DMZ_access_out remark Allow retieving of event logs from BVMIS&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group BVMonitoring host 10.254.88.10&lt;BR /&gt;access-list DMZ_access_out remark Allow Echo reply&lt;BR /&gt;access-list DMZ_access_out extended permit icmp object-group MAILDMZ host 10.254.88.10 echo-reply&lt;BR /&gt;access-list DMZ_access_out remark Allow ping from BVMIS to monitor&lt;BR /&gt;access-list DMZ_access_out extended permit icmp object-group BVMonitoring host 10.254.88.10 echo&lt;BR /&gt;access-list DMZ_access_out remark DFS for downloadsystem&lt;BR /&gt;access-list DMZ_access_out extended permit udp object-group DowloadSiteFTP eq netbios-ns host 10.254.88.10 eq netbios-ns&lt;BR /&gt;access-list DMZ_access_out remark DFS for downloadsystem&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP host 10.254.88.10 eq netbios-ssn&lt;BR /&gt;access-list DMZ_access_out remark DFS for downloadsystem&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group DowloadSiteFTP host 10.254.88.10 eq 445&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object-group MAILDMZ host 10.254.88.10 eq smtp&lt;BR /&gt;access-list DMZ_access_out extended permit tcp any host 10.254.88.10 eq www&lt;BR /&gt;access-list DMZ_access_out extended permit tcp any host 10.254.88.10 eq https&lt;BR /&gt;access-list DMZ_access_out remark Allow all trafic&lt;BR /&gt;access-list DMZ_access_out extended permit ip host 10.254.33.1 host 10.254.88.10&lt;BR /&gt;access-list DMZ_nat0_outbound extended permit ip 10.254.88.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list DMZ_mpc remark Outgoing HTTP Traffic&lt;BR /&gt;access-list DMZ_mpc extended permit tcp host 10.254.88.10 eq www any&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.32.0 255.255.224.0 10.254.96.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.96.0 255.255.255.0 10.254.32.0 255.255.224.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.64.0 255.255.224.0 10.254.96.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.96.0 255.255.255.0 10.254.64.0 255.255.224.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.97.0 255.255.255.0 10.254.96.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended deny ip 10.254.96.0 255.255.255.0 10.254.97.0 255.255.255.0&lt;BR /&gt;access-list HOLVPN extended permit ip 10.254.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list HOLVPN extended permit gre host 172.31.255.33 host 172.31.255.1&lt;BR /&gt;access-list Default webtype permit tcp host 10.252.41.1 log default&lt;BR /&gt;pager lines 40&lt;BR /&gt;//omited//&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu Outside10 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool Roaming 10.254.96.2-10.254.96.254 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface DMZ&lt;BR /&gt;ip audit attack action alarm drop&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-522.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Inside) 1 interface&lt;BR /&gt;global (Outside10) 5 interface&lt;BR /&gt;nat (DMZ) 0 access-list DMZ_nat0_outbound&lt;BR /&gt;nat (DMZ) 5 access-list DMZ_nat_outbound_1&lt;BR /&gt;nat (DMZ) 1 access-list DMZ_nat_outbound outside&lt;BR /&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;BR /&gt;nat (Inside) 5 access-list Inside_pnat_outbound_V1&lt;BR /&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,Outside10) tcp interface https 10.254.88.10 https netmask 255.255.255.255&lt;BR /&gt;static (DMZ,Outside10) tcp interface www 10.254.88.10 www netmask 255.255.255.255&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;static (Inside,Outside10) 87.213.234.132 10.254.97.240 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group DMZ_access_out out interface DMZ&lt;BR /&gt;access-group Inside_access_out out interface Inside&lt;BR /&gt;access-group Outside10_access_in in interface Outside10&lt;/P&gt;&lt;P&gt;route Inside 10.224.0.0 255.224.0.0 10.254.32.254 1&lt;BR /&gt;route Inside 10.254.0.0 255.255.0.0 10.254.32.254 1&lt;BR /&gt;route Inside 172.31.255.33 255.255.255.255 10.254.32.254 1&lt;BR /&gt;route Inside 10.0.0.0 255.0.0.0 10.254.32.254 1&lt;BR /&gt;route Outside10 0.0.0.0 0.0.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.249.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.250.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.252.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.251.0.0 255.255.0.0 87.213.234.129 1&lt;BR /&gt;route Outside10 10.254.96.0 255.255.255.0 87.213.234.129 1&lt;BR /&gt;route Outside10 172.31.255.1 255.255.255.255 87.213.234.129 1&lt;BR /&gt;////omited////&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access Inside&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map OutgoingHTTP&lt;BR /&gt;match access-list DMZ_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;policy-map DMZ-policy&lt;BR /&gt;class OutgoingHTTP&lt;BR /&gt;&amp;nbsp; police input 6000000 100000&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy DMZ-policy interface DMZ&lt;BR /&gt;ntp server 10.254.41.30&lt;/P&gt;&lt;P&gt;ssl trust-point BV Outside10&lt;/P&gt;&lt;P&gt;smtp-server 10.254.41.24&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:adc66f358665cdffc56d24e15b03444c&lt;BR /&gt;: end&lt;BR /&gt;bvvpn#&lt;BR /&gt;bvvpn#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from Packet-tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bvvpn# pac i o tcp 4.2.2.2 80 87.213.234.132 80 det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Outside10) 87.213.234.132 10.254.97.240 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip Inside host 10.254.97.240 Outside10 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 87.213.234.132&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 12178&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 87.213.234.132/0 to 10.254.97.240/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside10_access_in in interface Outside10&lt;BR /&gt;access-list Outside10_access_in extended permit tcp any object-group video_conference_tcp object-group video_conference_endpoints object-group video_conference_tcp&lt;BR /&gt;object-group service video_conference_tcp tcp&lt;BR /&gt;description: tcp ports used for Lifesize video conference&lt;BR /&gt;port-object range 60000 64999&lt;BR /&gt;port-object eq h323&lt;BR /&gt;port-object eq 1503&lt;BR /&gt;port-object eq 1731&lt;BR /&gt;port-object range 3230 3235&lt;BR /&gt;port-object range 1718 1719&lt;BR /&gt;port-object eq 1002&lt;BR /&gt;port-object range sip 5061&lt;BR /&gt;port-object eq www&lt;BR /&gt;object-group network video_conference_endpoints&lt;BR /&gt;network-object host 87.213.234.132&lt;BR /&gt;object-group service video_conference_tcp tcp&lt;BR /&gt;description: tcp ports used for Lifesize video conference&lt;BR /&gt;port-object range 60000 64999&lt;BR /&gt;port-object eq h323&lt;BR /&gt;port-object eq 1503&lt;BR /&gt;port-object eq 1731&lt;BR /&gt;port-object range 3230 3235&lt;BR /&gt;port-object range 1718 1719&lt;BR /&gt;port-object eq 1002&lt;BR /&gt;port-object range sip 5061&lt;BR /&gt;port-object eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0x926ff58, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14, user_data=0x926ff18, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=87.213.234.132, mask=255.255.255.255, port=80&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0x3bfcea8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=43497450, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x3d9b050, priority=11, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=265, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside10&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;bvvpn#&lt;BR /&gt;bvvpn#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:20:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279013#M345337</guid>
      <dc:creator>Allan Choo</dc:creator>
      <dc:date>2019-03-12T02:20:19Z</dc:date>
    </item>
    <item>
      <title>unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279014#M345340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ACL is blocking the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Inside_access_out extended permit icmp any any echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Inside_access_out extended permit icmp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Inside_access_out extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group Inside_access_out out interface Inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see it has no rule that would allow the traffic. The traffic in the "packet-tracer" first hits the WAN interface ACL and then hits this ACL and gets blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You either have to remove the ACL from the interface or add rules to this ACL to allow the traffic you are attempting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I dont use ACLs that are attached in the direction "out" at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279014#M345340</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T17:28:22Z</dc:date>
    </item>
    <item>
      <title>unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279015#M345345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried adding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_access_out extended permit ip host 10.254.97.240 host 87.213.234.132&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still is getting blocked when tracing from packet-tracer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any other suggestion?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279015#M345345</guid>
      <dc:creator>Allan Choo</dc:creator>
      <dc:date>2013-08-01T17:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279016#M345347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That ACL statement doesnt match what you are attempting with the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL that I mentioned above will prevent connections coming from any public IP address to reach any internal resource because you have only allowed ICMP and some traffic between private networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what the purpose of this ACL is alltogether.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would basically need to add the same ACL rules to this ACL that you added on the external interface ACL or you would have to remove the ACL from the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could simply add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Inside_access_out extended permit ip any host 10.254.97.240&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279016#M345347</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T17:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279017#M345351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so because i am using ACL, i would need a matching one for the inside interface? Ok it seems am a bit futher along now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by adding what you suggested in, now allows packet-tracer to complete successfully. but how come i am still not able to ping that external address from the internet?&amp;nbsp; wouldnt the permit icmp any any and the permit icmp any any echo allow me to ping that address if i have it staticly nat?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 18:18:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279017#M345351</guid>
      <dc:creator>Allan Choo</dc:creator>
      <dc:date>2013-08-01T18:18:36Z</dc:date>
    </item>
    <item>
      <title>unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279018#M345353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to already have a ICMP rule that allows ICMP Echo from any source address to any destination address in the above configuration. In both of the ACLs in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could perhaps add this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also try the ICMP with the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Outside10 icmp 1.1.1.1 8 0 87.213.234.132&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ICMP not going through can also be because of the server itself. It might be blocking ICMP Echo and not replying to them at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 18:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279018#M345353</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T18:22:48Z</dc:date>
    </item>
    <item>
      <title>unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279019#M345356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;running packet-tracer shows that it is allowing icmp.&amp;nbsp; I am able to ping the equipment from the inside address and connect to it via http from the inside, but when trying the external address i am not getting a response. If i try a ping from the internet router box to 87.213.234.132, my reply is from 10.254.97.240 which doesnt seem right.&amp;nbsp; shouldnt the reply be from 87.213.234.132?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:superuser@lan"&gt;superuser@lan&lt;/A&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; ping 87.213.234.132&lt;/P&gt;&lt;P&gt;ping: reply from 10.254.97.240: bytes=56 (data), icmp_seq=1, time=1 ms&lt;/P&gt;&lt;P&gt;ping: reply from 10.254.97.240: bytes=56 (data), icmp_seq=2, time=1 ms&lt;/P&gt;&lt;P&gt;ping: reply from 10.254.97.240: bytes=56 (data), icmp_seq=3, time=1 ms&lt;/P&gt;&lt;P&gt;ping: reply from 10.254.97.240: bytes=56 (data), icmp_seq=4, time=1 ms&lt;/P&gt;&lt;P&gt;ping: reply from 10.254.97.240: bytes=56 (data), icmp_seq=5, time=1 ms&lt;/P&gt;&lt;P&gt;ping: packets sent 5, packets received 5, packets lost 0 (0% loss)&lt;/P&gt;&lt;P&gt;Minimum = 1 msecs Maximum = 1 msecs Average = 1 msecs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bvvpn# pac i o i 1.1.1.1 8 0 87.213.234.132 det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Outside10) 87.213.234.132 10.254.97.240 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip Inside host 10.254.97.240 Outside10 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 87.213.234.132&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 14275&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 87.213.234.132/0 to 10.254.97.240/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside10_access_in in interface Outside10&lt;BR /&gt;access-list Outside10_access_in extended permit icmp any any echo&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x3d9d8b0, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19940, user_data=0x3d9b2e8, cs_id=0x0, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=2048&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x3bfcea8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=43519042, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x3d55e48, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=39, user_data=0x9a16410, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x9266ab8, priority=70, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=33, user_data=0x45a6088, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_out out interface Inside&lt;BR /&gt;access-list Inside_access_out extended permit icmp any any echo&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x3d9ac00, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=25757, user_data=0x3d9abc0, cs_id=0x0, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=2048&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Outside10) 87.213.234.132 10.254.97.240 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip Inside host 10.254.97.240 Outside10 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 87.213.234.132&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 14283&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x9957be0, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14113, user_data=0x91ccdf8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=10.254.97.240, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Outside10) 87.213.234.132 10.254.97.240 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip Inside host 10.254.97.240 Outside10 any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 87.213.234.132&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 14283&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x91cce68, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14128, user_data=0x91ccdf8, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.254.97.240, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x3bc78b8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=8988672, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 47517186, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.254.32.254 using egress ifc Inside&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 001d.a29c.747a hits 1309&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside10&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;bvvpn#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 20:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279019#M345356</guid>
      <dc:creator>Allan Choo</dc:creator>
      <dc:date>2013-08-01T20:07:58Z</dc:date>
    </item>
    <item>
      <title>unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279020#M345358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you should probably configure a traffic capture on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list SERVER-CAP permit ip any host 10.254.97.240&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list SERVER-CAP permit ip host 10.254.97.240 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture SERVER-CAP type raw-data access-list SERVER-CAP interface Inside buffer 1000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try ICMP from the Internet router once and then issue the following command and share the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture SERVER-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 20:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279020#M345358</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T20:24:52Z</dc:date>
    </item>
    <item>
      <title>unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279021#M345360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; here is the result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bvvpn(config)# sh cap SERVER-CAP&lt;/P&gt;&lt;P&gt;13 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 22:32:38.052594 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 22:32:43.053219 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 22:32:48.053113 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 22:32:53.057110 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 22:32:58.077983 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 22:32:58.648724 87.213.234.129 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 22:32:59.648617 87.213.234.129 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 22:33:00.648617 87.213.234.129 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 22:33:01.648648 87.213.234.129 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 22:33:02.648663 87.213.234.129 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 22:33:03.058270 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 22:33:08.053418 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 22:33:13.052762 65.60.104.194 &amp;gt; 10.254.97.240: icmp: echo request&lt;/P&gt;&lt;P&gt;13 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jouni, thank you for taking your time to help me out on this.. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 20:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279021#M345360</guid>
      <dc:creator>Allan Choo</dc:creator>
      <dc:date>2013-08-01T20:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279022#M345362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well we can see that ICMP Echo are coming from the WAN / Internet through the ASA towards the server. Somewhere along the way the ICMP Echo is either blocked or the ICMP Echo Reply are forwarded to the wrong place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would make sure that the LAN host in question has the correct default gateway configurations and that otherwise the routing back towards the ASA &lt;STRONG&gt;"Inside"&lt;/STRONG&gt; interface is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It might be that the traffic from the server is forwarded somewhere else BUT NOT the ASA &lt;STRONG&gt;"Inside"&lt;/STRONG&gt; interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 20:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279022#M345362</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T20:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279023#M345364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for all your help, i will look into the default gateway on the video equipment.&amp;nbsp; I will let you know what i find out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Allan &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 21:15:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279023#M345364</guid>
      <dc:creator>Allan Choo</dc:creator>
      <dc:date>2013-08-01T21:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279024#M345366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Allan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should not use the "out" keyword in your ACL that is applied to the Inside interface. This ACL is equivalent to an ACL applied to Outside interface in Inbound direction. So, by using this ACL, you are actually allowing traffic coming from Outside to Inside that leaves the Inside interface and going toward an Inside host.&amp;nbsp; Do not think that this ACL is used to allow outbound traffic from inside to outside. Because you are new to ASA as you said, you seem have some issues with ACL directions. I will be glad to explain further at any time the difference between Traffic Directions and ACL Directions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Jouni said, you should either remove this Inside ACL and take advantage of the implicit ALLOW rule from inside to outside or keep it as it is and add "&lt;STRONG&gt;access-list Inside_access_out extended permit ip any host 10.254.97.240".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;AM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 02:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279024#M345366</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-08-02T02:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279025#M345367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes there is a lot I still do not understand on the ASA, but I am learning slowing. I guess I can test this weekend by removing "out" from the inside interface and see what I break. I need to be very careful since this is in production.&lt;BR /&gt;&lt;BR /&gt;With jouni's help I am now able to use packet-tracer to trace a packet from the outside to inside successfully. Now the issue I am looking into is why my host device is not sending the ping back, even though I can ping from the internal network perfectly fine, pinging from the external address is not working yet.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 02:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279025#M345367</guid>
      <dc:creator>Allan Choo</dc:creator>
      <dc:date>2013-08-02T02:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: unable to configure static nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279026#M345369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try to apply a new ACL on the inside interface but this time in the inbound direction and add an icmp type echo reply?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list IN_Inside permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-group IN_Inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually, this ACL just for testing to know if the server can reply anyways. If still no reply, so it is definitely a server connectivity problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Normally, the ASA's normal behavior is to allow automatically any&amp;nbsp; traffic coming from higher interface (sec-level 100) to a lower&amp;nbsp; interface (sec-level 0) using an implicit ALLOW ACL. So in this case,&amp;nbsp; the server should respond without any ACL applied on the inside&amp;nbsp; interface. But let's knock on all&amp;nbsp; doors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 03:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-configure-static-nat/m-p/2279026#M345369</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-08-02T03:57:53Z</dc:date>
    </item>
  </channel>
</rss>

