<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Simple Port Forwarding on ASA 8.4 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035859#M438660</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahah! Almost fixed it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right, it was a NAT ordering issue (largely). When I put in these lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) 1 source static MY_SERVER_UDP interface service UDP_SERVER UDP_SERVER&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) 1 source static MY_SERVER_TCP interface service TCP_SERVER TCP_SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had your "1" there, to control order. When I took them out, I backed them up by typing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run | inc nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And copying pasting the results, which had become:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source static MY_SERVER_UDP interface service UDP_SERVER UDP_SERVER&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source static MY_SERVER_TCP interface service TCP_SERVER TCP_SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Becuase (I assume) the order is dictated on position in the config. I took them out, put them back in with the "1" and it works just fine again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remaining mysteries are...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Why they had to be at the top? My only other manual NATs where an OUTSIDE to OUTSIDE map to allow VPN users to hairpin back out to the Internet and an INSIDE to OUTSIDE nat that just no-natted an L2L VPN connection.&lt;/P&gt;&lt;P&gt;2) Why, still, doesn't it work as an auto-NAT. It doesn't matter (it works!) but auto-NAT just seems a lot cleaner, no?&lt;/P&gt;&lt;P&gt;3) Why was it matching the auto NAT for internal users that overloaded the external interface at all?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Sep 2012 12:10:29 GMT</pubDate>
    <dc:creator>Paul Marks</dc:creator>
    <dc:date>2012-09-11T12:10:29Z</dc:date>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035849#M438643</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried setting up some simple port forwarding on my ASA, where I want to forward one port on the external interface for both UDP and TCP to the same port on an internal server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It works fine for UDP, but all TCP packets are dropped on the outside interface, even though the configuration for UDP and TCP is basically the same! This is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network MY_SERVER&lt;/P&gt;&lt;P&gt; host 10.10.1.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service TCP_MY_SERVICE&lt;/P&gt;&lt;P&gt; service tcp destination eq 47500&lt;/P&gt;&lt;P&gt;object service UDP_MY_SERVICE&lt;/P&gt;&lt;P&gt; service udp destination eq 47500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,INSIDE) source static any any destination static interface MY_SERVER service UDP_MY_SERVICE UDP_MY_SERVICE&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,INSIDE) source static any any destination static interface MY_SERVER service TCP_MY_SERVICE TCP_MY_SERVICE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 1 extended permit tcp any object MY_SERVER eq 47500&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 2 extended permit udp any object MY_SERVER eq 47500&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 3 extended deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port count goes up on line 2 (UDP) but never for line 1. I just see the packet denied instead. Same thing happens in the packet tracer, a packet destined for my external interface on that port for UDP is allowed and NAT'd just fine. TCP it gets dropped by the ACL on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where am I going wrong?!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035849#M438643</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2019-03-11T23:50:26Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035850#M438644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration looks good, I quicky replicated it and it should work just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the packet tracer output and the exact version you are running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 17:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035850#M438644</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-09-05T17:12:40Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035851#M438646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help. Here's the two packet tracer commands - identical except for UDP in the first and TCP in the second:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input OUTSIDE udp 5.4.3.2 12345 &lt;EXTERNAL ip=""&gt; 47500&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: dynamic&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network INSIDE_10.10.1.0&lt;BR /&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE&lt;BR /&gt;Untranslate &lt;EXTERNAL ip=""&gt;/47500 to 10.10.1.4/47500&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;BR /&gt;access-list OUTSIDE_IN extended permit udp any object MY_SERVER eq 47500&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network INSIDE_10.10.1.0&lt;BR /&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 19145, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input OUTSIDE tcp 5.4.3.2 12345 &lt;EXTERNAL ip=""&gt; 47500&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; &lt;EXTERNAL ip=""&gt;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bit I've just notice there (and wasn't expecting) is in phase 2 of UDP it's matching:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; object network INSIDE_10.10.1.0&lt;BR /&gt; nat (INSIDE,OUTSIDE) dynamic interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which I was using to overload the outside interface for internal users, not for inbound traffic?&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;"&gt;ASA# packet-tracer input OUTSIDE udp 5.4.3.2 12345 &lt;EXTERNAL ip=""&gt; 47500&lt;P&gt;&lt;/P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;P&gt;&lt;/P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: dynamic&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network INSIDE_192.168.1.0&lt;BR /&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE&lt;BR /&gt;Untranslate &lt;EXTERNAL ip=""&gt;/47500 to 192.168.1.200/47500&lt;P&gt;&lt;/P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;BR /&gt;access-list OUTSIDE_IN extended permit udp any object MY_SERVER eq 47500&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 6&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 7&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network INSIDE_192.168.1.0&lt;BR /&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 19145, packet dispatched to next module&lt;P&gt;&lt;/P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;ASA# packet-tracer input OUTSIDE tcp 5.4.3.2 12345 &lt;EXTERNAL ip=""&gt; 47500&lt;P&gt;&lt;/P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;P&gt;&lt;/P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; &lt;EXTERNAL ip=""&gt;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;P&gt;&lt;/P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/EXTERNAL&gt;&lt;/EXTERNAL&gt;&lt;/EXTERNAL&gt;&lt;/EXTERNAL&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 17:39:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035851#M438646</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-05T17:39:59Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035852#M438648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh, and version 8.4.3&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 17:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035852#M438648</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-05T17:40:36Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035853#M438650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like the packet is not hitting the NAT rule, now for some reason udp hits the dynamic nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network INSIDE_10.10.1.0&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try this NAT rules instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network MY_SERVER&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static interface service udp 47500 47500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network MY_SERVER-tcp&lt;/P&gt;&lt;P&gt;host 10.10.1.4&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static interface service TCP 47500 47500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run the packet trace again to confirm you are hitting these rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 18:29:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035853#M438650</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-09-05T18:29:37Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035854#M438651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the following to make it work &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network MY_SERVER&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;host 10.10.1.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object service TCP_MY_SERVICE&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;service tcp &lt;STRONG&gt;source &lt;/STRONG&gt;eq 47500&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object service UDP_MY_SERVICE&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;service udp &lt;STRONG&gt;source &lt;/STRONG&gt;eq 47500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (inside,outside) source static&amp;nbsp; 1 MY_SERVER interface service TCP_MY_SERVICE&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static&amp;nbsp; 1 MY_SERVER interface service&amp;nbsp; UDP_MY_SERVICE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list OUTSIDE_IN line 1 extended permit tcp any object MY_SERVER eq 47500&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list OUTSIDE_IN line 2 extended permit udp any object MY_SERVER eq 47500&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list OUTSIDE_IN line 3 extended deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 18:37:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035854#M438651</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-05T18:37:52Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035855#M438653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why source? 47500 is the destination port in the packets I'm looking to NAT, no?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll give it a try now though!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 18:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035855#M438653</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-05T18:56:28Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035856#M438655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server is on the inside interface, you want to access from the outside world the internal server on port TCP/UDP 47500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be as simple as the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to set the object service based on source or destination you will need to check the order of the interfaces on the nat you want to do .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In our case &lt;/P&gt;&lt;P&gt;nat (&lt;STRONG&gt;inside&lt;/STRONG&gt;,outside) source static&amp;nbsp; 1 MY_SERVER interface service TCP_MY_SERVICE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The object we will try to access it's on the &lt;STRONG&gt;INSIDE,&lt;/STRONG&gt; and that is the source interface of our nat so we net to set it as source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I was clear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 19:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035856#M438655</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-05T19:05:25Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035857#M438657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First - thanks for your help and appologies for the late reply. Bit of a family emergancy here the moment after I submitted the question. Don't think the two are related &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, in answer to your question it looks exactly the same:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA#packet-tracer input OUTSIDE udp 1.2.3.4 12345 &lt;EXTERNAL ip=""&gt; 47500&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: dynamic&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network INSIDE_10.10.1.0&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface INSIDE&lt;/P&gt;&lt;P&gt;Untranslate &lt;EXTERNAL ip=""&gt;/47500 to 10.10.1.4/47500&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit udp any object MY_SERVER eq 47500&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type:&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type:&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network INSIDE_10.10.1.0&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 2174850, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: OUTSIDE&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: INSIDE&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input OUTSIDE tcp 1.2.3.4 12345 &lt;EXTERNAL ip=""&gt; 47500&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; &lt;EXTERNAL ip=""&gt;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/EXTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: OUTSIDE&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, again, the UDP flow is matching the NAT I created to allow internal clients out (why?!) and the TCP flow matches nothing (why?!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought it was a NAT ordering issue, but then TCP would work correctly, no?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 10:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035857#M438657</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-11T10:49:18Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035858#M438659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help, and appolgies for my late reply - been manic here. You explanation of source vs. destination makes sense - thanks for that, very clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried your suggestion and removed the other NAT for the server and added these lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) 1 source static MY_SERVER_UDP interface service UDP_SERVER UDP_SERVER&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) 1 source static MY_SERVER_TCP interface service TCP_SERVER TCP_SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; And it worked! The packet trace matched the right rule for both TCP and UDP and both flows were allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then removed the lines, to try auto-nat again, but it didn't work, so I put these back and... it doesn't work. It works for UDP (packet allowed AND matches this nat rule, not the incorrect one it was matching) but the TCP packet is denied as it always was by the outside ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am at a total loss. How can that happen!?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 11:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035858#M438659</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-11T11:09:38Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035859#M438660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahah! Almost fixed it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right, it was a NAT ordering issue (largely). When I put in these lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) 1 source static MY_SERVER_UDP interface service UDP_SERVER UDP_SERVER&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) 1 source static MY_SERVER_TCP interface service TCP_SERVER TCP_SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had your "1" there, to control order. When I took them out, I backed them up by typing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run | inc nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And copying pasting the results, which had become:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source static MY_SERVER_UDP interface service UDP_SERVER UDP_SERVER&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source static MY_SERVER_TCP interface service TCP_SERVER TCP_SERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Becuase (I assume) the order is dictated on position in the config. I took them out, put them back in with the "1" and it works just fine again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remaining mysteries are...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Why they had to be at the top? My only other manual NATs where an OUTSIDE to OUTSIDE map to allow VPN users to hairpin back out to the Internet and an INSIDE to OUTSIDE nat that just no-natted an L2L VPN connection.&lt;/P&gt;&lt;P&gt;2) Why, still, doesn't it work as an auto-NAT. It doesn't matter (it works!) but auto-NAT just seems a lot cleaner, no?&lt;/P&gt;&lt;P&gt;3) Why was it matching the auto NAT for internal users that overloaded the external interface at all?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 12:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035859#M438660</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-11T12:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035860#M438661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share you NAT configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This shouldn't be that hard to accomplish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I for example do a simple PAT + Port Forward scenario with the following configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Basic PAT&amp;nbsp; &lt;UL&gt;&lt;LI&gt;"after-auto" moves the NAT rule to the very end (Section 3)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network PAT-SOURCE&lt;/P&gt;&lt;P&gt;&amp;nbsp; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Port Forward&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network PORT-FORWARD&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.1.100&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (inside,outside) static interface service tcp &lt;LOCAL port=""&gt; &lt;MAPPED port=""&gt;&lt;/MAPPED&gt;&lt;/LOCAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I wanted to add a "NONAT" configuration to the above setup for a L2L VPN I could for example do the following configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LOCAL-LAN&lt;/P&gt;&lt;P&gt;&amp;nbsp; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network REMOTE-LAN&lt;/P&gt;&lt;P&gt;&amp;nbsp; subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL-LAN LOCAL-LAN destination static REMOTE-LAN REMOTE-LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 12:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035860#M438661</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-09-11T12:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035861#M438662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's my current (working) config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network INSIDE_10.10.1.x&lt;/P&gt;&lt;P&gt; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source static MY_SERVER_UDP interface service MY_SERVICE_UDP MY_SERVICE_UDP&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source static MY_SERVER_TCP interface service MY_SERVICE_TCP MY_SERVICE_TCP&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,OUTSIDE) source dynamic VPN_USERS_INTERNET_NAT interface&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source static INSIDE_10.10.1.x INSIDE_10.10.1.x destination static &lt;OTHER site=""&gt; &lt;OTHER site=""&gt; no-proxy-arp route-lookup&lt;/OTHER&gt;&lt;/OTHER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only bit that's new are the MY_SERVER lines for the new NAT'd service on the inside we're offering to the outside. Everything else is old and always worked fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It results in this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh nat detail&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;/P&gt;&lt;P&gt;1 (INSIDE) to (OUTSIDE) source static MY_SERVER_UDP interface&amp;nbsp;&amp;nbsp; service MY_SERVICE_UDP MY_SERVICE_UDP&lt;/P&gt;&lt;P&gt; translate_hits = 15686, untranslate_hits = 243488&lt;/P&gt;&lt;P&gt; Source - Origin: 10.10.1.4/32, Translated: &lt;OUTSIDE ip=""&gt;/29&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt; Service - Origin: udp source eq 47500 , Translated: udp source eq 47500&lt;/P&gt;&lt;P&gt;2 (INSIDE) to (OUTSIDE) source static MY_SERVER_TCP interface&amp;nbsp;&amp;nbsp; service MY_SERVICE_TCP MY_SERVICE_TCP&lt;/P&gt;&lt;P&gt; translate_hits = 103, untranslate_hits = 29339&lt;/P&gt;&lt;P&gt; Source - Origin: 10.10.1.4/32, Translated: &lt;OUTSIDE ip=""&gt;/29&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt; Service - Origin: tcp source eq 47500 , Translated: tcp source eq 47500&lt;/P&gt;&lt;P&gt;3 (OUTSIDE) to (OUTSIDE) source dynamic VPN_USERS_INTERNET_NAT interface&lt;/P&gt;&lt;P&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt; Source - Origin: 10.10.1.190-10.10.1.196, Translated: &lt;OUTSIDE ip=""&gt;/29&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;4 (INSIDE) to (OUTSIDE) source static INSIDE_10.10.1.x INSIDE_10.10.1.x&amp;nbsp;&amp;nbsp; destination static &lt;OTHER site=""&gt; &lt;OTHER site=""&gt; no-proxy-arp route-lookup&lt;/OTHER&gt;&lt;/OTHER&gt;&lt;/P&gt;&lt;P&gt; translate_hits = 4, untranslate_hits = 21&lt;/P&gt;&lt;P&gt; Source - Origin: 10.10.1.0/24, Translated: 10.10.1.0/24&lt;/P&gt;&lt;P&gt; Destination - Origin: 192.168.0.0/24, Translated: 192.168.0.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;/P&gt;&lt;P&gt;1 (INSIDE) to (OUTSIDE) source dynamic INSIDE_10.10.1.0 interface&lt;/P&gt;&lt;P&gt; translate_hits = 55051, untranslate_hits = 4303&lt;/P&gt;&lt;P&gt; Source - Origin: 10.10.1.0/24, Translated: &lt;OUTSIDE ip=""&gt;/29&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I don't understand is why if I use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network MY_SERVER_UDP&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 10.10.1.4&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (INSIDE,OUTSIDE) static interface service udp 47500 47500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network MY_SERVER_TCP&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 10.10.1.4&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (INSIDE,OUTSIDE) static interface service TCP 47500 47500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It fails with UDP matching the "object-group network INSIDE_10.10.1.x" NAT (so, working, I guess, but not for the reasons I expect) and TCP matches nothing and is dropped by the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it ordering issues again? How do I control the order of auto-nat?&lt;/P&gt;&lt;P&gt;Even if it is ordering, what does UDP match that INSIDE_10.10.1.x NAT anyway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 08:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035861#M438662</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-12T08:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035862#M438663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't tested the situation but to me it seems the only thing that might cause this is the fact that you have the default PAT configuration at the very top of your NAT configurations. Adding the "after-auto" in the configuration should take it to the very bottom where it would be applied only if no other more specific rules were found. &lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Didnt look close enough, seems its not the very top afterall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to redo the whole NAT configuration? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you decide to try these configurations be sure to backup the current ones incase theres some problems with these.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your configuration below I would personally try the following (will be using different interface and object names):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Clear NAT configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Clear all NAT configurations from the ASA&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Default PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create Default PAT rule for LAN user Internet traffic&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;I usually create an object group for the source addresses which makes adding new networks under the PAT that much easier&lt;/LI&gt;&lt;LI&gt;I also usually use the source interface &lt;STRONG&gt;"any"&lt;/STRONG&gt; in the NAT statement which means the source network to be NATed/PATed can be behind any interface.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;object-group network PAT-SOURCE-NETWORKS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; description Source networks for PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; network-object &lt;YOUR local="" networks=""&gt;&lt;/YOUR&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;nat (&lt;STRONG&gt;any&lt;/STRONG&gt;,outside) after-auto source dynamic PAT-SOURCE-NETWORKS interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;nat (inside,outside) after-auto source dynamic PAT-SOURCE-NETWORKS interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Port Forwards&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;object network PORTFORWARD-UDP47500&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; host 10.10.1.4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; nat (inside,outside) static interface service udp 47500 47500&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;object network PORTFORWARD-TCP47500&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; host 10.10.1.4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; nat (inside,outside) static interface service tcp 47500 47500&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;VPN User PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I'm not totally sure but my above PAT configuration with the source interface of &lt;STRONG&gt;"any"&lt;/STRONG&gt; might even do the trick with this if you add the VPN source network(s) under the object-group&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;object-group network VPN-PAT-SOURCE-NETWORKS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; description VPN source networks for PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; network-object &lt;YOUR vpn="" networks=""&gt;&lt;/YOUR&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;nat (outside,outside) source dynamic VPN-PAT-SOURCE-NETWORKS interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;L2L VPN NONAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure NONAT for the L2L&amp;nbsp; VPN connection&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;object-group network L2L-VPN-LOCAL-NETWORKS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; description L2L VPN local networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; network-object &lt;LOCAL network=""&gt;&lt;/LOCAL&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;object-group network L2L-VPN-REMOTE-NETWORKS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; description L2L VPN remote networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; network-object &lt;REMOTE network=""&gt;&lt;/REMOTE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;nat (inside,outside) source static L2L-VPN-LOCAL-NETWORKS L2L-VPN-LOCAL-NETWORKS destination static L2L-VPN-REMOTE-NETWORKS L2L-VPN-REMOTE-NETWORKS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configurations should handle all that you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 09:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035862#M438663</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-09-12T09:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035863#M438664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again the most specific at the top, that is all that matters...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 14:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035863#M438664</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-12T14:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035864#M438665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All - Thanks for your help. Playing around with everything here has been a massive help in understanding NAT ordering an it's importance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 08:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-on-asa-8-4/m-p/2035864#M438665</guid>
      <dc:creator>Paul Marks</dc:creator>
      <dc:date>2012-09-25T08:39:41Z</dc:date>
    </item>
  </channel>
</rss>

