<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dynamic NAT can be verified by Ping? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862946#M456730</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad I could help!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Jan 2012 19:02:11 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-01-18T19:02:11Z</dc:date>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862931#M456711</link>
      <description>&lt;P&gt;Hi Jcarvaja and all :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have problem to verify the Dynamic NAT by Ping. First of all, can Dynamic NAT verified by Ping?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following is my configuration of Dymanic NAT from Inside to DMZ. (My Inside Network is 192.168.100.0/24 and dmz network is 192.168.50.0/24).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 20 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (dmz) 20 192.168.50.151-192.168.50.160&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I use a host at inside with IP 192.168.100.x to ping a host at dmz with 192.168.50.x, it always fails and the result is failed also in reverse direction: from dmz to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before these two command lines, hosts from both sides can ping each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it any way (by adding command or other commands) that can make ping to verify the Dynamic NAT? Or that is no way can verify Dynamic NAT by ping?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:14:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862931#M456711</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2019-03-11T22:14:50Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862932#M456714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing is that you are doing PAT here, and as you know it uses translation based on source IP and Port and ICMP does not use ports so you would not be able.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is why I see in this particular scenario,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 19:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862932#M456714</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-16T19:13:59Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862933#M456716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jcarvaja :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If in this case, how can I use any tool to verify the dynamic NAT is working fine?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried to use Packet Tracer in term of ICMP or TCP to track packet from Inside to DMZ or DMZ to Inside, it seems like the packet drops at the NAT's step and cannot reach to the end IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the problem and anything can help? Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 01:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862933#M456716</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-17T01:45:36Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862934#M456718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What about the configuration of the nat on the DMZ ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide us the full nat configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 02:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862934#M456718</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-17T02:09:16Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862935#M456719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jcarvaja :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry that I have to amend above description that when doing packet tracing from inside to dmz, it is fine and show no packet drop. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet drop happens when doing packet tracing from dmz to inside, it shows packet drop at the step of NAT lookup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to ensure also when doing the packet tracing from dmz to inside, it has no packet drop at the step of NAT Lookup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it any way out for it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 02:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862935#M456719</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-17T02:18:25Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862936#M456720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jcarvaja :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the config file at the portion of nat and global.:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# conf t&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run nat&lt;/P&gt;&lt;P&gt;nat (inside) 20 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run global&lt;/P&gt;&lt;P&gt;global (dmz) 20 192.168.50.151-192.168.50.160&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems like one packet tracing direction from inside to dmz is OK. Is it should be the way and what is the implication that the reverse packet tracing is not OK and will it affect any traffic flow from DMZ to Inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I want to make the packet tracing from DMZ to Inside is OK, any command line can help to do that? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 02:27:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862936#M456720</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-17T02:27:32Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862937#M456721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jcarvaja :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is another info on the show NAT :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh nat&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.100.0 255.255.255.0 inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 20 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.100.0 255.255.255.0 dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 20 (192.168.50.151 - 192.168.50.160)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 12, untranslate_hits = 4&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.100.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 20 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.100.0 255.255.255.0 _internal_loopback any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 20 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;NAT policies on Interface dmz:&lt;BR /&gt;&amp;nbsp; match tcp dmz host 192.168.50.220 eq 56789 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.20.1/56789&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip dmz host DRMServer outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to MapAddDMZtoOutside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need more info, please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 03:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862937#M456721</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-17T03:42:37Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862938#M456722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wanted to see the entire Nat configuration, is that all you have ( those 2 nat statements) &lt;/P&gt;&lt;P&gt;nat (inside) 20 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (dmz) 20 192.168.50.151-192.168.50.160&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that all you have configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think there is a nat (dmz) global (outside). Am I right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 04:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862938#M456722</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-17T04:13:56Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862939#M456723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jcarvaja :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just have nat (inside) and global (dmz).&lt;/P&gt;&lt;P&gt;I do not use nat (dmz) and global (outside). Let me know if you need more info or entire config file. Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 06:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862939#M456723</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-17T06:28:31Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862940#M456724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from the inside to the DMZ ( Higher to lower security level traffic) should be allowed and the returning traffic should not need any nat translation as you are not doing any nat on the DMZ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just in case lets do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) DMZ_network_ip DMZ_network_ip netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can please provide a packet-tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate post that help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 17:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862940#M456724</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-17T17:55:45Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862941#M456725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tangsuan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issues here is that you are translating the source IP address from inside to dmz, and when you try a connection from dmz to inside this will be dropped due to NAT rpf-check. In other words the packet from DMZ to inside is not translated but the reply will be translated and the ASA will not allow this. The packet has to use the same NAT statement both ways. &lt;/P&gt;&lt;P&gt;You can use static NAT or NAT0 which are bidirectional, but you cannot use PAT if you want the connection to work from inside to DMZ and vise versa. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 19:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862941#M456725</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-01-17T19:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862942#M456726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jcarvaja :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried adding the command line as you suggested :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) DMZ_network_ip DMZ_network_ip netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the result is the same that the packet is dropped at the NAT by Packet Tracer when doing the TCP from dmz to inside. Please see below picture for reference. I think this should be the way as Dynamic NAT will fail from low security site to higher security site. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/8/9/72988-packet%20tracer%20dmz%20to%20inside.gif" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 02:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862942#M456726</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-18T02:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862943#M456727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understood the problem different, in this case you are innitiating the connection from the DMZ ( lower security level) to the inside ( higher security level ) so you will need 2 things:&lt;/P&gt;&lt;P&gt;1- ACL on the DMZ interface allowing the connection&lt;/P&gt;&lt;P&gt;2-Identity nat or Nat 0 as my co-worker&amp;nbsp; Luis Cambronero suggested, he is right you need a bi-derectional nat statement so pelase do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1-access-list dmz_in permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-group dmz_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- static (inside,dmz) 192.168.100.2 192.168.100.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz tcp permit 192.168.50.15 1025 192.168.100.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you will see it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate helpful posts!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 04:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862943#M456727</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T04:40:27Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862944#M456728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jcarvaja :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK. I tried to add the command :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this work for both directions. This shows that only static nat can have bi-direction and it overide the Dynamic Nat which still in the config file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will close this discussion because it already been answer by you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 06:53:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862944#M456728</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-18T06:53:30Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862945#M456729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Icambron :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get what you mean that dynamic nat can not have the packet tracer pass from high security to low security site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 06:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862945#M456729</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-01-18T06:56:27Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT can be verified by Ping?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862946#M456730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad I could help!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 19:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-can-be-verified-by-ping/m-p/1862946#M456730</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T19:02:11Z</dc:date>
    </item>
  </channel>
</rss>

