<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Trouble with NAT Rule for DMZ Webserver ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051832#M402155</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so I ran a packet capture and I cannot see any inbound traffic when I try and navigate to one of my public IP Addresses. I have a /29 network supplied by my ISP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my outside interface configured for (sanitized for security please let me know if this makes sense) 192.168.5.12 with a subnet mask of 255.255.255.248 I have configured the NAT rule for 192.168.5.10 (outside) to my DMZ IP address of 10.47.20.21 which according to packet trace should be working just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have confirmed with my ISP that 192.168.5.10 does indeed belong to me and should be routing properly but I dont see anything in packet captures or in my Syslog that indicates that I am getting any traffic on 192.168.5.10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Oct 2012 14:51:41 GMT</pubDate>
    <dc:creator>joshscott</dc:creator>
    <dc:date>2012-10-26T14:51:41Z</dc:date>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051825#M402146</link>
      <description>&lt;P&gt;Hello all I am having a hell of a time with a NAT rule I am trying to set up for a webserver I want to place into my DMZ. I have created a NAT rule and added the appropriate access rules but I am still unable to hit my webserver from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a packet trace from the CLI and here are the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 192.168.0.1 1025 10.47.20.21 80 detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.47.20.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp object-group WebServerAccess object DMZ_WebHost object-group PublicWebServerRestricted&lt;/P&gt;&lt;P&gt;object-group network WebServerAccess&lt;/P&gt;&lt;P&gt; description: Allowed IPs to connect to ACME External Web Server&lt;/P&gt;&lt;P&gt; network-object object ACME_TESTING_IP&lt;/P&gt;&lt;P&gt; network-object object GenericCompanyCorporate&lt;/P&gt;&lt;P&gt;object-group service PublicWebServerRestricted tcp&lt;/P&gt;&lt;P&gt; description: Restricted Ports for Public Web Server&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacd94350, priority=13, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=19, user_data=0xa9040a80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.0.1, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.47.20.21, mask=255.255.255.255, port=80, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacc129a8, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=191811, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xadf98708, priority=70, domain=inspect-http, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=55, user_data=0xad998988, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xadf9b518, priority=51, domain=ids, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14552, user_data=0xadf9b228, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xad71e010, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=13914, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network DMZ_WebHost&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 192.168.5.1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xacd82240, priority=6, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=25, user_data=0xacd81a40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.47.20.21, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: dmz&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im not sure what im looking at here other than it seems to be failing at the last bit.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051825#M402146</guid>
      <dc:creator>joshscott</dc:creator>
      <dc:date>2019-03-12T00:13:24Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051826#M402147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that the nat rule is not hit. Can you provide the output of command 'show run' or all configuration related to nat as below :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if software version 8.2 or below&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run global&lt;/P&gt;&lt;P&gt;show run st&lt;/P&gt;&lt;P&gt;show access-list &lt;NAME&gt; (if any access-list is used in nat configurations)&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if software version 8.3 or above&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run object&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narayana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 05:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051826#M402147</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-10-25T05:56:26Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051827#M402148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that the configuration in one of the NAT portions is not the rule you want the traffic to hit?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network DMZ_WebHost&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 192.168.5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this IS the correct NAT rule then you have to use the actual NAT IP in the packet-tracer command and not the local address. (If the "host" configuration under that object contains the IP 10.47.20.21)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 06:20:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051827#M402148</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-25T06:20:56Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051828#M402149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the real Ip of the server is 10.47.20.21 and the mapped IP is 192.168.5.1, then the nat rule configured is correct. However the packet-tracer command should be to the mapped IP as below :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 192.168.0.1 1025 192.168.5.180 detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narayana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 06:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051828#M402149</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-10-25T06:27:46Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051829#M402151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Weird now when I run the packet-trace command using the public IP address instead of the internal as Narayana suggested then it shows that it is working. However I am still unable to hit that IP Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 192.168.0.1 1025 192.168.5.1$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacb6cc30, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=45975731, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network DMZ_WebHost&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 192.168.5.1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface dmz&lt;/P&gt;&lt;P&gt;Untranslate 192.168.5.1/80 to 10.47.20.21/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp object-group WebServerAccess object DMZ_WebHost object-group GenericCompanyRestricted&lt;/P&gt;&lt;P&gt;object-group network WebServerAccess&lt;/P&gt;&lt;P&gt; description: Allowed IPs to connect to ACME External Web Server&lt;/P&gt;&lt;P&gt; network-object object ACME_TESTING_IP&lt;/P&gt;&lt;P&gt; network-object object GenericCompanyCorporate&lt;/P&gt;&lt;P&gt;object-group service GenericCompanyRestricted tcp&lt;/P&gt;&lt;P&gt; description: Restricted Ports for Public Web Server&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacd94350, priority=13, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=38, user_data=0xa9040a80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.0.1, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.47.20.21, mask=255.255.255.255, port=80, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacc129a8, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1026923, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xadf98708, priority=70, domain=inspect-http, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=679, user_data=0xad998988, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xadf9b518, priority=51, domain=ids, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=60553, user_data=0xadf9b228, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xad71e010, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=55724, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network DMZ_WebHost&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 192.168.5.1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xacd82240, priority=6, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=44, user_data=0xacd81a40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.47.20.21, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xacc67d20, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=42802, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1078064, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_inspect_http&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_divert_fragment&lt;/P&gt;&lt;P&gt;snp_ids&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_inspect_http&lt;/P&gt;&lt;P&gt;snp_fp_divert_fragment&lt;/P&gt;&lt;P&gt;snp_ids&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: dmz&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What should I check next? I will post the results of show run nat and show run object here shortly after i sanitize them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 14:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051829#M402151</guid>
      <dc:creator>joshscott</dc:creator>
      <dc:date>2012-10-25T14:21:06Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051830#M402152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the results from show run nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static ACME_TERMINAL_SERVERS testCOX_Source_NAT destination static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt;nat (outside,dmz) source static any any destination static interface ACME-TMG1 service FTPS_PASSIVE FTPS_PASSIVE&lt;/P&gt;&lt;P&gt;nat (outside,dmz) source static any any destination static interface ACME-TMG1 service INBOUND_OWA INBOUND_OWA&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface theforce service INBOUND_MAIL INBOUND_MAIL&lt;/P&gt;&lt;P&gt;nat (outside,dmz) source static any any destination static interface ACME-TMG1 service FTPS_MAIN FTPS_MAIN&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static ACME1 interface service COportal COportal&lt;/P&gt;&lt;P&gt;nat (inside,any) source static ACME_INSIDE_NETWORKS ACME_INSIDE_NETWORKS destination static Outside1_HOSTS_REMOTE Outside1_HOSTS_REMOTE&lt;/P&gt;&lt;P&gt;nat (inside,any) source static ACME_INSIDE_NETWORKS ACME_INSIDE_NETWORKS destination static VANRU_HOSTS_REMOTE VANRU_HOSTS_REMOTE&lt;/P&gt;&lt;P&gt;nat (inside,any) source static ACME_INSIDE_NETWORKS ACME_INSIDE_NETWORKS destination static ACME_COLO_NETWORK ACME_COLO_NETWORK&lt;/P&gt;&lt;P&gt;nat (inside,any) source static ACME_INSIDE_NETWORKS ACME_INSIDE_NETWORKS destination static Outside3_HOSTS_REMOTE Outside3_HOSTS_REMOTE&lt;/P&gt;&lt;P&gt;nat (inside,any) source static ACME_INSIDE_NETWORKS ACME_INSIDE_NETWORKS destination static Outside3_HOSTS_REMOTE_BACKUP Outside3_HOSTS_REMOTE_BACKUP&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface description Basic PAT&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static EXEMPT EXEMPT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network vpnclient-network&lt;/P&gt;&lt;P&gt; nat (outside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network dmz-network&lt;/P&gt;&lt;P&gt; nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network AS5400-VOIP&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 192.168.5.2&lt;/P&gt;&lt;P&gt;object network DMZ-FTP-01&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 192.168.5.5&lt;/P&gt;&lt;P&gt;object network DMZ_WebHost&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 192.168.5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the results for show run object&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network ACME_INSIDE_NETWORKS&lt;/P&gt;&lt;P&gt; subnet 10.47.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network theforce&lt;/P&gt;&lt;P&gt; host 10.47.2.10&lt;/P&gt;&lt;P&gt;object service FTPS_MAIN&lt;/P&gt;&lt;P&gt; service tcp destination eq 990&lt;/P&gt;&lt;P&gt;object service FTPS_PASSIVE&lt;/P&gt;&lt;P&gt; service tcp destination range 10000 10050&lt;/P&gt;&lt;P&gt;object service INBOUND_MAIL&lt;/P&gt;&lt;P&gt; service tcp destination eq smtp&lt;/P&gt;&lt;P&gt;object service INBOUND_OWA&lt;/P&gt;&lt;P&gt; service tcp destination eq https&lt;/P&gt;&lt;P&gt;object network vpnclient-network&lt;/P&gt;&lt;P&gt; subnet 10.47.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 10.47.2.17&lt;/P&gt;&lt;P&gt; host 10.47.2.17&lt;/P&gt;&lt;P&gt;object network EXEMPT&lt;/P&gt;&lt;P&gt; subnet 10.47.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network vpn&lt;/P&gt;&lt;P&gt; subnet 10.47.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object service COportal&lt;/P&gt;&lt;P&gt; service tcp destination eq 8443&lt;/P&gt;&lt;P&gt;object network ACMEC1&lt;/P&gt;&lt;P&gt; host 10.47.2.158&lt;/P&gt;&lt;P&gt;object network ACMEC-TMG1&lt;/P&gt;&lt;P&gt; host 10.47.20.10&lt;/P&gt;&lt;P&gt; description TMG&lt;/P&gt;&lt;P&gt;object network dmz-network&lt;/P&gt;&lt;P&gt; subnet 10.47.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network AS5400-VOIP&lt;/P&gt;&lt;P&gt; host 10.47.20.3&lt;/P&gt;&lt;P&gt; description VOIP Switch&lt;/P&gt;&lt;P&gt;object service IN_VOIP_5060&lt;/P&gt;&lt;P&gt; service tcp destination eq sip&lt;/P&gt;&lt;P&gt;object service IN_VOIP_NTP&lt;/P&gt;&lt;P&gt; service udp destination eq ntp&lt;/P&gt;&lt;P&gt; description NTP&lt;/P&gt;&lt;P&gt;object service IN_VOIP_SIP&lt;/P&gt;&lt;P&gt; service udp destination range 5004 65535&lt;/P&gt;&lt;P&gt; description SIP signaling and Media Ports (RTP)&lt;/P&gt;&lt;P&gt;object service IN_VOIP_SNMP&lt;/P&gt;&lt;P&gt; service udp destination range snmp snmptrap&lt;/P&gt;&lt;P&gt; description SNMP&lt;/P&gt;&lt;P&gt;object service IN_VOIP_SSH&lt;/P&gt;&lt;P&gt; service tcp destination eq ssh&lt;/P&gt;&lt;P&gt; description SSH access&lt;/P&gt;&lt;P&gt;object service IN_VOIP_TELNET&lt;/P&gt;&lt;P&gt; service tcp destination eq telnet&lt;/P&gt;&lt;P&gt; description Telnet&lt;/P&gt;&lt;P&gt;object service OUT_FTP_10022&lt;/P&gt;&lt;P&gt; service tcp destination eq 10022&lt;/P&gt;&lt;P&gt;object service OUT_FTP_2233&lt;/P&gt;&lt;P&gt; service tcp destination eq 2233&lt;/P&gt;&lt;P&gt;object service RDP&lt;/P&gt;&lt;P&gt; service tcp destination eq 3389&lt;/P&gt;&lt;P&gt;object service POP3_SSL&lt;/P&gt;&lt;P&gt; service tcp destination eq 995&lt;/P&gt;&lt;P&gt;object service IN_VOIP_TCP_544&lt;/P&gt;&lt;P&gt; service tcp destination eq kshell&lt;/P&gt;&lt;P&gt;object service IN_VOIP_UDP_544&lt;/P&gt;&lt;P&gt; service udp destination eq 544&lt;/P&gt;&lt;P&gt;object service HTTP_8080&lt;/P&gt;&lt;P&gt; service tcp destination eq 8080&lt;/P&gt;&lt;P&gt;object network ACMEDATA1&lt;/P&gt;&lt;P&gt; host 10.47.2.141&lt;/P&gt;&lt;P&gt; description Joseph's workstation&lt;/P&gt;&lt;P&gt;object network 192.168.85.8-FTP&lt;/P&gt;&lt;P&gt; host 192.168.85.8&lt;/P&gt;&lt;P&gt; description TEMP - Joseph FTP&lt;/P&gt;&lt;P&gt;object network ACMEC-DP1&lt;/P&gt;&lt;P&gt; host 10.47.2.25&lt;/P&gt;&lt;P&gt; description Data Processing Server&lt;/P&gt;&lt;P&gt;object service OUT_FTP_PASSIVE_1&lt;/P&gt;&lt;P&gt; service tcp destination range 23552 24063&lt;/P&gt;&lt;P&gt;object service OUT_FTP_PASSIVE_2&lt;/P&gt;&lt;P&gt; service tcp destination range 49152 65535&lt;/P&gt;&lt;P&gt;object service OUT_FTP_PASSIVE_3&lt;/P&gt;&lt;P&gt; service tcp destination range 30000 50000&lt;/P&gt;&lt;P&gt;object network MAILFILTER_RANGE_1&lt;/P&gt;&lt;P&gt; subnet 192.168.90.9 255.255.255.0&lt;/P&gt;&lt;P&gt;object network MAILFILTER_RANGE_2&lt;/P&gt;&lt;P&gt; subnet 192.168.90.10 255.255.255.192&lt;/P&gt;&lt;P&gt;object network DMZ-FTP-01&lt;/P&gt;&lt;P&gt; host 10.47.20.15&lt;/P&gt;&lt;P&gt; description DMZ SSH&lt;/P&gt;&lt;P&gt;object network Remote2FTPES&lt;/P&gt;&lt;P&gt; host 192.168.95.5&lt;/P&gt;&lt;P&gt; description RemoteHost1 FTPES Server sftp.Remote2.com&lt;/P&gt;&lt;P&gt;object network RemoteHost1_REMOTE_HOSTS&lt;/P&gt;&lt;P&gt; subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt; description RemoteHost1 Remote Hosts&lt;/P&gt;&lt;P&gt;object network ACMEC-TS1&lt;/P&gt;&lt;P&gt; host 10.47.2.17&lt;/P&gt;&lt;P&gt;object network ACMEC-TS2&lt;/P&gt;&lt;P&gt; host 10.47.2.18&lt;/P&gt;&lt;P&gt;object network RemoteHost1_PUBLIC_1&lt;/P&gt;&lt;P&gt; host 192.168.100.10&lt;/P&gt;&lt;P&gt; description Public IP Address for RemoteHost1&lt;/P&gt;&lt;P&gt;object network RemoteHost1_PUBLIC_2&lt;/P&gt;&lt;P&gt; host 192.168.100.11&lt;/P&gt;&lt;P&gt; description Public IP Address for RemoteHost1&lt;/P&gt;&lt;P&gt;object network ACME_TESTING_IP&lt;/P&gt;&lt;P&gt; host 192.168.0.1&lt;/P&gt;&lt;P&gt; description Testing IP Address from ACME Financial&lt;/P&gt;&lt;P&gt;object network PowerUserTerminalServer&lt;/P&gt;&lt;P&gt; host 10.47.2.12&lt;/P&gt;&lt;P&gt; description Primary Power User Terminal Server&lt;/P&gt;&lt;P&gt;object network ACMEC-TS4&lt;/P&gt;&lt;P&gt; host 10.47.2.20&lt;/P&gt;&lt;P&gt; description Secondary Power User Terminal Server&lt;/P&gt;&lt;P&gt;object network Remote3_CAPITAL_1&lt;/P&gt;&lt;P&gt; host 192.168.105.2&lt;/P&gt;&lt;P&gt;object network Remote3_CAPITAL_2&lt;/P&gt;&lt;P&gt; host 192.168.105.3&lt;/P&gt;&lt;P&gt;object network Remote3_CAPITAL_3&lt;/P&gt;&lt;P&gt; host 192.168.105.4&lt;/P&gt;&lt;P&gt;object network Remote3_CAPITAL_4&lt;/P&gt;&lt;P&gt; host 192.168.105.5&lt;/P&gt;&lt;P&gt;object network Remote4_FTP_IP&lt;/P&gt;&lt;P&gt; host 192.168.105.6&lt;/P&gt;&lt;P&gt;object network Remote5_CONSUMER&lt;/P&gt;&lt;P&gt; host 192.168.110.2&lt;/P&gt;&lt;P&gt; description Remote5 Consumer&lt;/P&gt;&lt;P&gt;object network ACMEC-WS02&lt;/P&gt;&lt;P&gt; host 10.47.2.93&lt;/P&gt;&lt;P&gt; description Joseph's PC&lt;/P&gt;&lt;P&gt;object network ACME_EXTERNAL_IP&lt;/P&gt;&lt;P&gt; host 192.168.5.6&lt;/P&gt;&lt;P&gt;object network ACMEC-MGMT1&lt;/P&gt;&lt;P&gt; host 10.47.2.24&lt;/P&gt;&lt;P&gt;object network RemoteHost1_1&lt;/P&gt;&lt;P&gt; host 10.62.236.50&lt;/P&gt;&lt;P&gt;object network testRemoteHost1_Source_NAT&lt;/P&gt;&lt;P&gt; host 192.168.217.60&lt;/P&gt;&lt;P&gt;object network Remote6_1&lt;/P&gt;&lt;P&gt; host 192.168.45.5&lt;/P&gt;&lt;P&gt; description IP address for Remote6 connectivity to the SFTP&lt;/P&gt;&lt;P&gt;object network Remote6_2&lt;/P&gt;&lt;P&gt; host 192.168.45.6&lt;/P&gt;&lt;P&gt; description IP address for Remote6 connectivity to the SFTP&lt;/P&gt;&lt;P&gt;object network RemoteHost1_2&lt;/P&gt;&lt;P&gt; host 192.168.56.2&lt;/P&gt;&lt;P&gt;object network RemoteHost1_3&lt;/P&gt;&lt;P&gt; host 192.168.56.3&lt;/P&gt;&lt;P&gt;object network FIS_FTP_SERVER_1&lt;/P&gt;&lt;P&gt; host 192.168.56.4&lt;/P&gt;&lt;P&gt;object network GenericCompanySFTP&lt;/P&gt;&lt;P&gt; host 192.168.58.5&lt;/P&gt;&lt;P&gt; description GenericCompany IP Address&lt;/P&gt;&lt;P&gt;object network Remote8SFTP1&lt;/P&gt;&lt;P&gt; host 192.168.62.2&lt;/P&gt;&lt;P&gt; description IP Address that Remote8 Uses to connect to the ACME SFTP&lt;/P&gt;&lt;P&gt;object network Remote8SFTP2&lt;/P&gt;&lt;P&gt; host 192.168.62.3&lt;/P&gt;&lt;P&gt; description IP Address that Remote8 Uses to connect to the ACME SFTP&lt;/P&gt;&lt;P&gt;object network Remote9FTPS&lt;/P&gt;&lt;P&gt; host 192.102.5&lt;/P&gt;&lt;P&gt;object network ACMEC-WS01&lt;/P&gt;&lt;P&gt; host 10.47.2.51&lt;/P&gt;&lt;P&gt;object service FTPS_IMPLICIT&lt;/P&gt;&lt;P&gt; service tcp destination range 5500 5599&lt;/P&gt;&lt;P&gt;object service OUT_FTP_PASSIVE_4&lt;/P&gt;&lt;P&gt; service tcp destination range 5500 5599&lt;/P&gt;&lt;P&gt;object network Remote10_1&lt;/P&gt;&lt;P&gt; host 67.53.190.215&lt;/P&gt;&lt;P&gt; description Green Bay Location&lt;/P&gt;&lt;P&gt;object network Remote10_2&lt;/P&gt;&lt;P&gt; host 12.192.9.22&lt;/P&gt;&lt;P&gt; description New York Location&lt;/P&gt;&lt;P&gt;object service ActiveSync&lt;/P&gt;&lt;P&gt; service tcp source eq https destination eq https&lt;/P&gt;&lt;P&gt; description ActiveSync&lt;/P&gt;&lt;P&gt;object network RemoteHost1_PUBLIC_3&lt;/P&gt;&lt;P&gt; host 192.168.161.2&lt;/P&gt;&lt;P&gt;object network DialerRemoteHost&lt;/P&gt;&lt;P&gt; host 192.168.3.110&lt;/P&gt;&lt;P&gt; description Dialer Remote Server&lt;/P&gt;&lt;P&gt;object network ACMEC-DIALC&lt;/P&gt;&lt;P&gt; host 10.47.2.33&lt;/P&gt;&lt;P&gt; description Dialer Server&lt;/P&gt;&lt;P&gt;object network DialerRemoteHosts&lt;/P&gt;&lt;P&gt; subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description DialerRemoteHosts&lt;/P&gt;&lt;P&gt;object service DialerAgentDialer1&lt;/P&gt;&lt;P&gt; service tcp source eq 943 destination eq 943&lt;/P&gt;&lt;P&gt; description Dialer Agent Dialer Port 1&lt;/P&gt;&lt;P&gt;object service DialerAgentDialer2&lt;/P&gt;&lt;P&gt; service tcp source eq 4510 destination eq 4510&lt;/P&gt;&lt;P&gt; description Dialer Agent Dialer Port 2&lt;/P&gt;&lt;P&gt;object network ACMEC-LT03&lt;/P&gt;&lt;P&gt; host 10.47.2.183&lt;/P&gt;&lt;P&gt;object service DialerAgentDialer3&lt;/P&gt;&lt;P&gt; service udp source eq sip destination eq sip&lt;/P&gt;&lt;P&gt;object service DialerAgentDialer4&lt;/P&gt;&lt;P&gt; service tcp source eq 4722 destination eq 4722&lt;/P&gt;&lt;P&gt;object network FIS_FTP_SERVER_2&lt;/P&gt;&lt;P&gt; host 192.168.25.2&lt;/P&gt;&lt;P&gt;object network FIS_FTP_SERVER_3&lt;/P&gt;&lt;P&gt; host 192.168.25.3&lt;/P&gt;&lt;P&gt;object network ACMEC-DP2&lt;/P&gt;&lt;P&gt; host 10.47.2.90&lt;/P&gt;&lt;P&gt;object network ACMEC-WS07&lt;/P&gt;&lt;P&gt; host 10.47.2.144&lt;/P&gt;&lt;P&gt; description Candace's PC&lt;/P&gt;&lt;P&gt;object network ACMEC-WEB1&lt;/P&gt;&lt;P&gt; host 10.47.20.21&lt;/P&gt;&lt;P&gt;object network DMZ_WebHost&lt;/P&gt;&lt;P&gt; host 10.47.20.21&lt;/P&gt;&lt;P&gt; description DMZ Web Server&lt;/P&gt;&lt;P&gt;object network GenericCompanyCorporate&lt;/P&gt;&lt;P&gt; host 192.168.7.5&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 15:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051830#M402152</guid>
      <dc:creator>joshscott</dc:creator>
      <dc:date>2012-10-25T15:23:41Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051831#M402154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As we see that the packet-tracer shows that its hitting the correct nat rule, if the web server is still not accessible, I would suggest you to run packet captures on ASA interfaces and troubleshoot further. Please find the link below for packet capture commands :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/c1.html#wp2147322"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/c1.html#wp2147322&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narayana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 02:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051831#M402154</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-10-26T02:24:48Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051832#M402155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so I ran a packet capture and I cannot see any inbound traffic when I try and navigate to one of my public IP Addresses. I have a /29 network supplied by my ISP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my outside interface configured for (sanitized for security please let me know if this makes sense) 192.168.5.12 with a subnet mask of 255.255.255.248 I have configured the NAT rule for 192.168.5.10 (outside) to my DMZ IP address of 10.47.20.21 which according to packet trace should be working just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have confirmed with my ISP that 192.168.5.10 does indeed belong to me and should be routing properly but I dont see anything in packet captures or in my Syslog that indicates that I am getting any traffic on 192.168.5.10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 14:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051832#M402155</guid>
      <dc:creator>joshscott</dc:creator>
      <dc:date>2012-10-26T14:51:41Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051833#M402156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are not getting traffic on 192.168.5.10, then it might be an arp issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Please try deleting arp-cache on the device after the ASA towards internet and then send traffic on this IP address and check if it is received &lt;/P&gt;&lt;P&gt;(Or) &lt;/P&gt;&lt;P&gt;change the your Outside interface Ip address from 192.168.5.12 to 192.168.5.10, wait for few seconds and then change it back to 192.168.5.12 (this would make your network traffic to go down for few seconds and you need to have console/inside access to ASA while performing this). This would make the ASA to proxy arp for this IP. Then check if you can receive traffic on this IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narayana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2012 00:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051833#M402156</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-10-28T00:33:35Z</dc:date>
    </item>
    <item>
      <title>Trouble with NAT Rule for DMZ Webserver ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051834#M402157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you attach some logs? Maybe we can get some information about it&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture to see if there is a problem with packets dropped by the ASA in some way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh capture asp | include ./ip address of the server/&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Dec 2012 23:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-rule-for-dmz-webserver-asa5510/m-p/2051834#M402157</guid>
      <dc:creator>andduart</dc:creator>
      <dc:date>2012-12-20T23:56:55Z</dc:date>
    </item>
  </channel>
</rss>

