<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static PAT Access-List bug? (8.3+) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226878#M346333</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue isn't with the NAT.&amp;nbsp; While I may not entirely agree with it, I understand how the NAT is allowing both the port 21 and port 2211 connection to work.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is with the access-list.&amp;nbsp; With both the Static NAT and the Static PAT in place, there is no way for me to block port 21 traffic, but allow port 2211 traffic.&amp;nbsp; The problem is the same ACL entry that I have in place letting the "wanted" traffic through is also inadvertedly allowing the "unwanted" traffic through.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me, this seems like a bug =/&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Jul 2013 21:21:47 GMT</pubDate>
    <dc:creator>eddie.harmoush</dc:creator>
    <dc:date>2013-07-16T21:21:47Z</dc:date>
    <item>
      <title>Static PAT Access-List bug? (8.3+)</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226875#M346326</link>
      <description>&lt;P&gt;I noticed what appears to be a bug with Access-Lists when using Static Port Translations.&amp;nbsp; Below are the steps to recreate.&amp;nbsp; Was wondering if anyone else has experienced this, or had an idea what was going on.&amp;nbsp; If not, I'll use the forums feature to create a TAC case to confirm it is a bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The subject mentions 8.3+ to indicate the new NAT syntax, but the actual Firewall I've been using to recreate this bug are all 8.4(1)+&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I have nothing but the following configured on my ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;object network WEB-SVR&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; host 192.168.112.50&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; nat (inside,outside) static 1.1.99.125&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;object network +WEB-SVR-ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; host 192.168.112.50&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; nat (inside,outside) static 1.1.99.125 service tcp 21 2211&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a test, I create an ACL entry to allow port 80 traffic to my web server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;asa84(config)# access-list 101 extended permit tcp any host 192.168.112.50 eq www&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;asa84(config)# access-group 101 in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And using Packet-Tracer, I can verify everything is working as expected, thus far:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;asa84(config)# packet-tracer input outside tcp 9.9.9.9 9999 1.1.99.125 &lt;STRONG&gt;80&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;~-~-~-~-~ TRUNCATED ~-~-~-~-~&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-group 101 in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;access-list 101 extended permit tcp any host 192.168.112.50 eq www&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;~-~-~-~-~ TRUNCATED ~-~-~-~-~&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-interface: inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I want to allow FTP traffic to my server, but only to the Masked port of 2211.&amp;nbsp; Requests made to my server's IP over port 21 should be blocked.&amp;nbsp; So I create an ACL Entry using the Real port (21):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;asa84(config)# access-list 101 extended permit tcp any host 192.168.112.50 eq &lt;STRONG&gt;ftp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I modify my packet-tracer so packets from the outside are arriving on TCP port 2211:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;asa84(config)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input outside tcp 9.9.9.9 9999 1.1.99.125 &lt;STRONG&gt;2211&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;~-~-~-~-~ TRUNCATED ~-~-~-~-~&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-group 101 in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;access-list 101 extended permit tcp any host 192.168.112.50 eq ftp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;~-~-~-~-~ TRUNCATED ~-~-~-~-~&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-interface: inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, all is working as expected.&amp;nbsp; This is where it gets strange.&amp;nbsp; Remember, my goal was to mask my FTP server to a non-standard port.&amp;nbsp; I did not want my server accessed over port 21, only port 2211.&amp;nbsp; However, if a packet-tracer is used to see what happens traffic is sent to port 21:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;asa84(config)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input outside tcp 9.9.9.9 9999 1.1.99.125 &lt;STRONG&gt;21&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;~-~-~-~-~ TRUNCATED ~-~-~-~-~&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-group 101 in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;access-list 101 extended permit tcp any host 192.168.112.50 eq ftp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;~-~-~-~-~ TRUNCATED ~-~-~-~-~&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-interface: inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same rule which allowed my port 2211 traffic is also incorrectly allowing my port 21 traffic.&amp;nbsp; This appears to be a security risk, in a way, as a port I didn't explicitely allow through my Firewall is being allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I remove the Static 1-to-1 translation (&lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no object network WEB-SVR&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;, requests on the outside to port 21 are correctly being dropped.&amp;nbsp; But the existence of that Static translation shouldn't affect whether my ACL is processing or dropping traffic, right?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone else ran into this?&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226875#M346326</guid>
      <dc:creator>eddie.harmoush</dc:creator>
      <dc:date>2019-03-12T02:12:50Z</dc:date>
    </item>
    <item>
      <title>Static PAT Access-List bug? (8.3+)</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226876#M346329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you know, with the new 8.3+ software the NAT is done first and then the ACL. So you will be basically all the time referring to the real IP address and port on the ACL rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for the Static PAT configurations the real port is TCP/21 and that is allowed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the same way the Static NAT configured contains a TCP/21 to TCP/21 mapping and therefore connection towards the port TCP/21 gets matched to the same ACL after the UN-NAT phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest I have never run into this situation myself but now when I look at it, it does seem like there is no real way to differentiate the 2 public ports because the local ports are used in the interface ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess one really messy solution would be if the FTP server used a non default local port also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you could block destination port TCP/21 and only allow TCP/2211 in the ACL as it would now be the local port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other solution would naturally be to use only Static PAT wihtout the Static NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cant think of anything else at the moment but will add if something comes to mind.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 17:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226876#M346329</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-16T17:02:08Z</dc:date>
    </item>
    <item>
      <title>Static PAT Access-List bug? (8.3+)</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226877#M346331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eddie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In fact the one-to-one NAT is the one that allows you to connect on port 21:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WEB-SVR&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.112.50&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (inside,outside) static 1.1.99.125&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA will check each packet against the NAT table and take the first match, in this case the ASA check for the NAT table and found that there is a one to one translation. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"The same rule which allowed my port 2211 traffic is also incorrectly allowing my port 21 traffic"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually is not, the one to one allows port 21 (the same way it took port 80). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you are seeing is expected, this is the reason why once you removed the one to one it works fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 17:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226877#M346331</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-07-16T17:14:25Z</dc:date>
    </item>
    <item>
      <title>Static PAT Access-List bug? (8.3+)</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226878#M346333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue isn't with the NAT.&amp;nbsp; While I may not entirely agree with it, I understand how the NAT is allowing both the port 21 and port 2211 connection to work.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is with the access-list.&amp;nbsp; With both the Static NAT and the Static PAT in place, there is no way for me to block port 21 traffic, but allow port 2211 traffic.&amp;nbsp; The problem is the same ACL entry that I have in place letting the "wanted" traffic through is also inadvertedly allowing the "unwanted" traffic through.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me, this seems like a bug =/&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 21:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226878#M346333</guid>
      <dc:creator>eddie.harmoush</dc:creator>
      <dc:date>2013-07-16T21:21:47Z</dc:date>
    </item>
    <item>
      <title>Static PAT Access-List bug? (8.3+)</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226879#M346334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say the NAT and ACL are working in the way they are "supposed" to in the new software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, as I said I have never had to configure a setup where I would have both Static NAT and Static PAT configured for the same host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do understand your point that this is certainly working in a bad/wierd manner with regards to the ACL. But the fact that the ACLs now refer to the local ports and IP addresses means that the public port isnt referenced in the ACL. Therefore you will be allowing traffic on the port TCP/21 and TCP/2211 since with the Static NAT and Static PAT, both are using the local (unmapped) port of TCP/21 which is the one that the ACL check for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I personally ran into this situation I would probably change the configuration so that I would configure Static PAT for all the services that need to be reached through the "outside". If the host/server needed to use the public IP address for outbound traffic I would additionally configure a Dynamic PAT rule using the same public IP address for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 06:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226879#M346334</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T06:40:41Z</dc:date>
    </item>
    <item>
      <title>Static PAT Access-List bug? (8.3+)</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226880#M346336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eddie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a bug, it is expected, there is no problem with the access list. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have both there is no way to block port 21, indeed the same ACL allows both packets but for different flows, one hitting the port forwarding and the other hitting the one to one NAT rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 15:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-access-list-bug-8-3/m-p/2226880#M346336</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-07-17T15:30:30Z</dc:date>
    </item>
  </channel>
</rss>

