<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 305006 portmap translation creation failed src inside dst outsid in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259671#M350215</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seem you actually made the NAT configuration simpler so that might actually be better than what I suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you dont really need NAT0 configurations on each interface as the operation should be birectional anyway. And since "inside" now has NAT0 configuration to the other networks it should be possible to connect in each direction (provided you want to even allow that on the ACLs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 May 2013 20:51:30 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-08T20:51:30Z</dc:date>
    <item>
      <title>305006 portmap translation creation failed src inside dst outside</title>
      <link>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259666#M350210</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am stumped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my scrubbed config. I hope I didn't leave out anything useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan100&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.0.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 1.2.3.4 255.255.255.0&lt;/P&gt;&lt;P&gt;no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan300&lt;/P&gt;&lt;P&gt;nameif voip&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan400&lt;/P&gt;&lt;P&gt;nameif wlan&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 172.16.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 1.2.3.9&lt;BR /&gt;global (outside) 3 1.2.3.10&lt;/P&gt;&lt;P&gt;global (outside) 4 interface&lt;/P&gt;&lt;P&gt;global (voip) 4 interface&lt;/P&gt;&lt;P&gt;global (wlan) 4 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no_nat&lt;BR /&gt;nat (inside) 1 10.0.0.0 255.255.0.0&lt;BR /&gt;nat (voip) 2 192.168.0.0 255.255.255.0&lt;BR /&gt;nat (wlan) 3 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 4 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am after: I want voip and wlan to be on there own and only be able to go to internet (with their own external IP) and not talk to eachother or inside. The exception is that I want 10.0.1.0/24 (management range) to be able to talk to wlan and voip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem: With the configuration as shown above, I acheive everything I need except for 10.0.1.0/24 reports "portmap translation creation failed for tcp src inside:10.0.1.13/1076 dst outside:1.2.2.2/443" when trying to move through the outside interface (the internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I swap ID's 1 and 4 then 10.0.1.0/24 works perfectly, it can talk to all 3 segments, but the rest of the 10.0.0.0/16 range displays the portmap translation errors in the asdm real-time log viewer when trying to access the internet (outside interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I feel like I am very close to my desired configuration, but I can't figure out how to solve this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5505&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(2)&lt;/P&gt;&lt;P&gt;Device Manager Version 6.3(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a bunch for stopping by.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259666#M350210</guid>
      <dc:creator>OneTwoThree445566</dc:creator>
      <dc:date>2019-03-12T01:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: 305006 portmap translation creation failed src inside dst ou</title>
      <link>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259667#M350211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not 100% sure but I think if you are going to try to do Dynamic PAT using the "interface" IP address for 2 local networks then you should use the same ID&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 4 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside) 1 10.0.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 4 10.0.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 10.0.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 10.0.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean changing the ID doesnt alter the situation at all since you were attempting to PAT the LAN networks to the same "interface" IP address anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Typo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 19:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259667#M350211</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-08T19:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: 305006 portmap translation creation failed src inside dst ou</title>
      <link>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259668#M350212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would personally recommend not configuring Dynamic PAT between your local interface. Mostly for the sake of having a simple NAT between your local networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would leave the NAT configurations out completely or configure NAT0 between the networks and then use ACL to control what traffic is allow from each interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could for example configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 &lt;ADD lines="" in="" the="" current="" no_nat="" acl=""&gt;&lt;/ADD&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 10.0.0.0 255.255.0.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 10.0.0.0 255.255.0.0 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VOIP-NAT0 permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list VOIP-NAT0 permit ip 192.168.0.0 255.255.255.0 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (voip) 0 access-list VOIP-NAT0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list WLAN-NAT0 permit ip 172.16.0.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list WLAN-NAT0 permit ip 172.16.0.0 255.255.255.0 10.0.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (wlan) 0 access-list WLAN-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Typos&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 19:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259668#M350212</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-08T19:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: 305006 portmap translation creation failed src inside dst ou</title>
      <link>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259669#M350213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It might even be enough to just remove the &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 4 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable Internet traffic / translation for the 10.0.1.0/24 network also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 19:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259669#M350213</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-08T19:18:42Z</dc:date>
    </item>
    <item>
      <title>305006 portmap translation creation failed src inside dst outsid</title>
      <link>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259670#M350214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the tips! Here is what I ended up doing and it seems to be working perfectly!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip 10.0.1.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip 10.0.1.0 255.255.255.0 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 1.2.3.9&lt;BR /&gt;global (outside) 3 1.2.3.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no_nat&lt;BR /&gt;nat (inside) 1 10.0.0.0 255.255.0.0&lt;BR /&gt;nat (voip) 2 192.168.0.0 255.255.255.0&lt;BR /&gt;nat (wlan) 3 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your assistance, I really appreciate it. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 20:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259670#M350214</guid>
      <dc:creator>OneTwoThree445566</dc:creator>
      <dc:date>2013-05-08T20:47:49Z</dc:date>
    </item>
    <item>
      <title>305006 portmap translation creation failed src inside dst outsid</title>
      <link>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259671#M350215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seem you actually made the NAT configuration simpler so that might actually be better than what I suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you dont really need NAT0 configurations on each interface as the operation should be birectional anyway. And since "inside" now has NAT0 configuration to the other networks it should be possible to connect in each direction (provided you want to even allow that on the ACLs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 20:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/305006-portmap-translation-creation-failed-src-inside-dst/m-p/2259671#M350215</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-08T20:51:30Z</dc:date>
    </item>
  </channel>
</rss>

