<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Nat Issues 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021113#M398263</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 1.2.3.4 4522 x.x.x.77 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network x.x.x.22&lt;BR /&gt; nat (inside,outside) static x.x.x.77 dns&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate x.x.x.77/80 to x.x.x.22/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object x.x.x.22 eq www&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network x.x.x.22&lt;BR /&gt; nat (inside,outside) static x.x.x.77 dns&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 747589118, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Oct 2012 15:04:52 GMT</pubDate>
    <dc:creator>Jason Jayko</dc:creator>
    <dc:date>2012-10-04T15:04:52Z</dc:date>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021105#M398255</link>
      <description>&lt;P&gt;I have an ASA 5520 Cisco Adaptive Security Appliance Software Version 8.4(2)8 Device Manager Version 6.4(5)206. I am trying to add a nat for outside&lt;/P&gt;&lt;P&gt;x.x.x.77 port going inside x.x.x.22 port 80 . the wan interface is .74 with subnet of 255.255.255.248&lt;/P&gt;&lt;P&gt;the rule will add but traffic wont pass in .&lt;/P&gt;&lt;P&gt;Thank You in advance&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:03:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021105#M398255</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2019-03-12T00:03:57Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021106#M398256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you trying to make a port forward configuration using your firewalls outside interface public IP OR are you trying to configure a separate public IP address for your server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For portforward the configuration would look like this (using example names and IPs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network PORTFORWARD-TCP80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.10.10.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object PORTFORWARD-TCP80 eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any host 10.10.10.22 eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For simple static translation the configuration would look like this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- x.x.x.x is the public IP address you have reserved for inside host. In the earlier example the nat congiguration uses the outside interfaces IP address (using the keyword "interface")&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.10.10.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object STATIC eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any host 10.10.10.22 eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 10:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021106#M398256</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-04T10:25:43Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021107#M398257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; trying to configure a separate public IP address for our server since there is already port 80 for another server off of the .74 public interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 10:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021107#M398257</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-04T10:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021108#M398258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you basicly just configure the Static NAT and open the ports you want&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NAME&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host y.y.y.y&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static x.x.x.x dns&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;NAME = the name of the object.&lt;/LI&gt;&lt;LI&gt;inside = nameif of your local network interface on the ASA&lt;/LI&gt;&lt;LI&gt;outside = nameif of your outside network interface on the ASA&lt;/LI&gt;&lt;LI&gt;y.y.y.y = the local IP address of the server/computer&lt;/LI&gt;&lt;LI&gt;x.x.x.x = the public IP address that you have reserved for this server/computer&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this you need to make an access-list configuration to allow traffic from outside/Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object NAME eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;OUTSIDE-IN = name of the access-list attached to the outside interface (direction "in")&lt;/LI&gt;&lt;LI&gt;object NAME = is the object/host you want to open the traffic to from outside/Internet&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the ASA softwares 8.3 and above you always use the local IP address even when configuring access-list rules from outside/Internet. In the 8.2 and before softwares you always used the NAT IP address (public) in the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I usually use the object in the access-list configurations as it already contains the local IP address of the server/computer under it. But you can naturally just type the local IP address in the access-list rule too like I did in the first post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 10:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021108#M398258</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-04T10:47:06Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021109#M398259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; so i added the following with no luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network x.x.x.22&lt;/P&gt;&lt;P&gt;host x.x.x.22&lt;/P&gt;&lt;P&gt;nat (inside,outside) static x.x.x.77 dns&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit tcp any object x.x.x.22 eq 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 11:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021109#M398259</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-04T11:23:21Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021110#M398260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There shouldn't be that many possibilities on what would be wrong with firewall configuration in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I don't know the rest of your NAT configuration I can't say if some other NAT rule somehow overlaps it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could always use the "packet-tracer" command from the command line interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your situation it could be for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 1.2.3.4 1025 x.x.x.77 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;outside is the interface where the traffic is coming from&lt;/LI&gt;&lt;LI&gt;1.2.3.4 is a random source address for traffic&lt;/LI&gt;&lt;LI&gt;1025 is a random source port for the traffic&lt;/LI&gt;&lt;LI&gt;x.x.x.77 is the destination address of that traffic&lt;/LI&gt;&lt;LI&gt;80 is the destination port for that traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could always post the output of that command here (and remove public IP address information where needed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 11:59:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021110#M398260</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-04T11:59:50Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021111#M398261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Here are the results of the packet trace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp x.x.x.22 1025 x.x.x.77 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network x.x.x.22&lt;BR /&gt; nat (inside,outside) static x.x.x.77 dns&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate x.x.x.77/80 to x.x.x.22/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object x.x.x.22 eq www&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network x.x.x.22&lt;BR /&gt; nat (inside,outside) static x.x.x.77 dns&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 12:28:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021111#M398261</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-04T12:28:18Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021112#M398262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Never seen that Drop-reason before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure you used some random IP address for the source address in the packet-tracer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Above you mention x.x.x.22 which you mentioned as local IP address of the actual server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use for example 1.2.3.4 as source address and the NAT IP as the destination IP address of the packet-tracer and post the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 12:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021112#M398262</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-04T12:43:01Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021113#M398263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 1.2.3.4 4522 x.x.x.77 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network x.x.x.22&lt;BR /&gt; nat (inside,outside) static x.x.x.77 dns&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate x.x.x.77/80 to x.x.x.22/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object x.x.x.22 eq www&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network x.x.x.22&lt;BR /&gt; nat (inside,outside) static x.x.x.77 dns&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 747589118, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 15:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021113#M398263</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-04T15:04:52Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021114#M398264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems that this latest packet-tracer indicates that the connection goes through just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If its still not working is the actual server running the service working correctly? Can it be confirmed straight from the local LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do note that you cant connect to the server from inside your firewall using the public NAT IP address. You will have to use the local IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, if your public IP address has an associated DNS name you can use that from LAN and it will connect (since you have the DNS parameter in the NAT command)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though this is just guessing since you havent yet mentioned where you are testing the connection from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 08:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021114#M398264</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-05T08:12:34Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021115#M398265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; works fine internally. we have another internal webserver with a&amp;nbsp; different public address x.x.x.76 getting the same results when i try and create the rule. they work fine internally.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 09:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021115#M398265</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-05T09:37:23Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021116#M398266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think anyone from the Internet can reach the servers with the public IP addresses but you can't connect to the servers using the public IP address that you are using in the NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the servers where on a different interface on the ASA than your LAN you could atleast configure the NAT so that the servers are visible to the LAN with the public IP address also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you had anyone test connection to the new server with the public IP address to see if its working fine?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 10:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021116#M398266</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-05T10:05:14Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021117#M398267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i have another public address pointing to a different internal server using port 80 and both will not work from the public internet using name or ip. they both work fine internally.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 14:38:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021117#M398267</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-05T14:38:13Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021118#M398268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;on have a server on x.x.x.76 using https: and i can get to it from the outside/inside&amp;nbsp; fine&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 14:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021118#M398268</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-05T14:53:09Z</dc:date>
    </item>
    <item>
      <title>Nat Issues 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021119#M398269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i think the problem maybe related to some other rules the vendor that set it up last year put in. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 22:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues-5520/m-p/2021119#M398269</guid>
      <dc:creator>Jason Jayko</dc:creator>
      <dc:date>2012-10-05T22:39:20Z</dc:date>
    </item>
  </channel>
</rss>

