<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static NAT in 8.4.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883577#M457816</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the configuration from GUI:&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/3/9/81934-Capture.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the NAT rules from CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Exchange&lt;/P&gt;&lt;P&gt; nat (Inside,outside) static ExchangePublic service tcp smtp smtp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (Inside,outside) after-auto source static NETWORK_OBJ_192.168.0.0_23 NETWORK_OBJ_192.168.0.0_23 destination static NETWORK_OBJ_10.10.0.0_26 NETWORK_OBJ_10.10.0.0_26 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (outside,any) after-auto source static any any destination static interface Web.Form service Web.Form.8888 Web.Form.8888&lt;/P&gt;&lt;P&gt;nat (outside,any) after-auto source static any any destination static interface Web.Form service http http&lt;/P&gt;&lt;P&gt;nat (outside,Inside) after-auto source static any any destination static ExchangePublic Exchange service HTTPS HTTPS&lt;/P&gt;&lt;P&gt;nat (Inside,outside) after-auto source dynamic Company_LAN interface dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the xlate:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show xlate local 192.168.1.13"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1043 in use, 2889 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;/P&gt;&lt;P&gt;TCP PAT from Inside:192.168.1.13 25-25 to outside:X.X.123.147 25-25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 0:03:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;TCP PAT from Inside:192.168.1.13 443-443 to outside:X.X.123.147 443-443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags srT idle 0:11:38 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did clear xlate serveral times but nothing changed...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Mar 2012 08:08:23 GMT</pubDate>
    <dc:creator>k.dimitrovski</dc:creator>
    <dc:date>2012-03-23T08:08:23Z</dc:date>
    <item>
      <title>Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883575#M457813</link>
      <description>&lt;P&gt;I'm trying to do Object NAT in 8.4.2 for a mail server and I'm now seeing that the rule is working only from outside-&amp;gt;inside. Whenever the mail server sends a message it is translated with the default Dynamic NAT defined in the rules. &lt;/P&gt;&lt;P&gt;I cannot understand why the twice nat isn't working in both directions. &lt;/P&gt;&lt;P&gt;I've attached screenshot of the rule and Packet Tracer test in the direction in which the problem occurs. &lt;/P&gt;&lt;P&gt;Just to clarify the server in the inside-&amp;gt;outside direction has to be NATed with X.X.123.147 (ExchangePublic IP) but instead it is NATed woth X.X.123.146 (default dynamic NAT address). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883575#M457813</guid>
      <dc:creator>k.dimitrovski</dc:creator>
      <dc:date>2019-03-11T22:46:01Z</dc:date>
    </item>
    <item>
      <title>Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883576#M457814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems pretty strange to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the configuration in the packet-tracer input it seems that the default Dynamic NAT/PAT configuration should be one of the last NATs that the ASA would check if it didnt find a rule from the previous ones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please show how you configured the static NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should be something like this I think&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network EXCHANGE-STATIC&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt; nat (Inside,outside) static y.y.y.y dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example this should always NAT the servers traffic to the same public address when connecting outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And to my understanding that should already overwrite the rule show in the packet-tracer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you checked what "show xlate" shows for your active translations on the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 06:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883576#M457814</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-03-23T06:33:07Z</dc:date>
    </item>
    <item>
      <title>Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883577#M457816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the configuration from GUI:&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/3/9/81934-Capture.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the NAT rules from CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Exchange&lt;/P&gt;&lt;P&gt; nat (Inside,outside) static ExchangePublic service tcp smtp smtp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (Inside,outside) after-auto source static NETWORK_OBJ_192.168.0.0_23 NETWORK_OBJ_192.168.0.0_23 destination static NETWORK_OBJ_10.10.0.0_26 NETWORK_OBJ_10.10.0.0_26 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (outside,any) after-auto source static any any destination static interface Web.Form service Web.Form.8888 Web.Form.8888&lt;/P&gt;&lt;P&gt;nat (outside,any) after-auto source static any any destination static interface Web.Form service http http&lt;/P&gt;&lt;P&gt;nat (outside,Inside) after-auto source static any any destination static ExchangePublic Exchange service HTTPS HTTPS&lt;/P&gt;&lt;P&gt;nat (Inside,outside) after-auto source dynamic Company_LAN interface dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the xlate:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show xlate local 192.168.1.13"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1043 in use, 2889 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;/P&gt;&lt;P&gt;TCP PAT from Inside:192.168.1.13 25-25 to outside:X.X.123.147 25-25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 0:03:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;TCP PAT from Inside:192.168.1.13 443-443 to outside:X.X.123.147 443-443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags srT idle 0:11:38 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did clear xlate serveral times but nothing changed...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 08:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883577#M457816</guid>
      <dc:creator>k.dimitrovski</dc:creator>
      <dc:date>2012-03-23T08:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883578#M457818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry I only use the CLI when configuring ASA &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first thing that caught my eye is the fact that you are doing NAT from outside to inside also?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,Inside) after-auto source static any any destination static ExchangePublic Exchange service HTTPS HTTPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also theres this configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Exchange&lt;/P&gt;&lt;P&gt; host 192.168.1.13 (added this myself)&lt;/P&gt;&lt;P&gt; nat (Inside,outside) static ExchangePublic service tcp smtp smtp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems like you have done 2 separate configurations just to allow outside users to reach port TCP/443 and TCP/25 on your inside exchange server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the public IP address x.x.123.147 is reserved only for the Exchange server you dont really need these configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could simply do the configuration I mentioned earlier, which is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network EXCHANGE-STATIC&lt;/P&gt;&lt;P&gt; host 192.168.1.13&lt;/P&gt;&lt;P&gt; nat (Inside,outside) static y.y.123.147 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now you could reach the server from outside with its public IP address (provided your outside ACL allowed these connections). A connection coming to port TCP/25 would go trough to the servers actual IP address with port TCP/25. Same would apply to connections from outside to port TCP/443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also every connection from the server to outside would always use the public address of x.x.123.147 (unless you had some twice NAT / Policy NAT overriding it regarding some connections)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 09:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883578#M457818</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-03-23T09:07:37Z</dc:date>
    </item>
    <item>
      <title>Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883579#M457819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately we cannot use this public IP address only for this server. We have to share it with some other services on other servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I have to use port forwarding and I managed to get it working only with configuring two NAT rules (one incoming, one outgoing). Maybe Cisco had this in mind when they named it "Twice" NAT! &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Inside,outside) after-auto source static Exchange ExchangePublic service SMTP SMTP&lt;/P&gt;&lt;P&gt;nat (outside,Inside) after-auto source static any any destination static ExchangePublic Exchange service SMTP SMTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the answers JouniForss!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anybody knows how can I enable the use of the "Twice NAT" so I can use only one rule for both directions please be kind enough and reply &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 10:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883579#M457819</guid>
      <dc:creator>k.dimitrovski</dc:creator>
      <dc:date>2012-04-02T10:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883580#M457821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just created some configurations on our ASA running in multiple context mode to test this out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This context is at its very basic settings and heres the most essential configurations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN and WAN interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/8.251&lt;/P&gt;&lt;P&gt; description PAT&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.2.3.4 255.255.252.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.1251&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SERVER-LOCAL&lt;/P&gt;&lt;P&gt; host 10.10.10.100&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp smtp smtp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark Permit SMTP&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any object SERVER-LOCAL eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically the above configurations state that all traffic from LAN to WAN is PATed to the outside interface IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also tells that connections coming from WAN towards outside interface IP with port TCP/25 will get forwarded to local host 10.10.10.100 on port TCP/25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres packet-tracer output for LAN -&amp;gt; WAN and WAN -&amp;gt; LAN (SMTP) traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside interface IP address has been changed in the output and commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN -&amp;gt; WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 10.10.10.100 1025 55.66.77.88 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group INSIDE-IN in interface inside&lt;/P&gt;&lt;P&gt;access-list INSIDE-IN extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Subtype:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Dynamic translate 10.10.10.100/1025 to 1.2.3.4/23119&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 602888186, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN -&amp;gt; LAN (SMTP port forwardng traffic)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 55.66.77.88 1025 1.2.3.4 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Type: UN-NAT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Subtype: static&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;object network SERVER-LOCAL&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp smtp smtp&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;NAT divert to egress interface inside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Untranslate 1.2.3.4/25 to 10.10.10.100/25&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any object SERVER-LOCAL eq smtp&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network SERVER-LOCAL&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp smtp smtp&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 602901393, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When trying another type of NAT I got it working with this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SERVER-LOCAL&lt;/P&gt;&lt;P&gt; host 10.10.10.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service SMTP-OUT&lt;/P&gt;&lt;P&gt; service tcp source eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static SERVER-LOCAL interface service SMTP-OUT SMTP-OUT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 55.66.77.88 1025 1.2.3.4 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Type: UN-NAT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Subtype: static&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER-LOCAL interface service SMTP-OUT SMTP-OUT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;NAT divert to egress interface inside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Untranslate 1.2.3.4/25 to 10.10.10.100/25&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any object SERVER-LOCAL eq smtp&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static SERVER-LOCAL interface service SMTP-OUT SMTP-OUT&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 603208853, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if it helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 10:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883580#M457821</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-02T10:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883581#M457822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know whether I've mentioned, but for this NAT I'm not using the Outside interface IP. I'm using another IP that is routed from the ISP towards the Outside interface. Maybe this has something with the problem I have or maybe not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're getting the correct NAT because the LAN-&amp;gt; WAN translation is done by: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and not by the port forward NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting the same result but in my case the Dynamic NAT IP and the ExchangeWAN IPs are different. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 11:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883581#M457822</guid>
      <dc:creator>k.dimitrovski</dc:creator>
      <dc:date>2012-04-02T11:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883582#M457823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me understand what is being attempted here........&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A.&amp;nbsp; you have a mail server which needs to be reached by external users via port 25.&lt;/P&gt;&lt;P&gt;Does email only come in from external users on 123.146 or on 123.147,&amp;nbsp; or both??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;B.&amp;nbsp; sometimes unsoliticed the mail server sends email messages to external users but has to use .123.137 to do this.&lt;/P&gt;&lt;P&gt;(could be an automatic mailing or someone within the corporation, behind the router sends an email outbound)??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C.&amp;nbsp; you have a dynamic pat rule which sends out host traffic on 123.146.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( This is an excellent manual nat example which needs much better documentation with gui pics in the documentation, plug for my earlier post &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With a nat object rule in place email from the outside users should get to the mail server and be sent back the way it came.&amp;nbsp; I think thats what your saying is that the static nat rule is working.&amp;nbsp;&amp;nbsp; Presuming all this mail is coming in on the 123.147 outside interface IP.&amp;nbsp;&amp;nbsp;&amp;nbsp; BUT you have C, which is a dynamic pat rule for users behind the router to reach the internet etc and that is set for 123.146.&amp;nbsp;&amp;nbsp; Unfortunately this affects your mail server sending out email messages unsolicited (originating behind the router) or users sending out email from within the LAN.&amp;nbsp; Due to the dynamic rule these are going out the wrong 123.146 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The discussion above should clearly delineate requirements and the issues before delving into snippets of potential solutions.&amp;nbsp;&amp;nbsp; One of my beefs on this forum in that discussions should be much more education focussed with concepts, requirements analysis and then solutions.&amp;nbsp; Okay only because&amp;nbsp; I am cisco illiterate and need my hand held. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The embedded NAT rule in the first post looks right for a standard port forwarding to a mail server.&amp;nbsp; Apparently, because I have never done one (and thus my interest) you need a way to also handle email originating within the router (twice or manual NAT).&amp;nbsp;&amp;nbsp; The bane of my existence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;1. Can a manual nat rule for email originating within the router overrule a dynamic pat rule for hosts to use a specific wanIP??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Can you have more than one dynamic pat rules and specifically a second dynamic pat rule for a specifc host (email server) to use 123.147?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; It appears that order of NAT rules will probably be important (especially in 2.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 12:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883582#M457823</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-02T12:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883583#M457824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think I'm already starting to mix up all the different posts I've been answering. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you have the ASA outside interface IP for PAT use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you have a addiotional public IP (that can't be used for the one server alone)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess in your original setup the port forward worked fine, but when the server is sending traffic from LAN it wont match the NAT statement on your firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess your addiotional NAT statement above now handles that direction and it doesnt fall to the default PAT anymore?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest I don't run into similiar situations much since we require to have a public IP for a server and we dont do portforwarding unless its a small environment and even then not without a good reason. It needlesly complicates the setup when considering configurations and maintanance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 12:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883583#M457824</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-02T12:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883584#M457825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, I have a simple ASA 5505 without the luxury of a second WANIP so this is not as helpful as I would like it to be.&lt;/P&gt;&lt;P&gt;I created a NAT rule from nat rules (vice embedded nat object).&amp;nbsp;&amp;nbsp; I note that the asdm placed this nat rule before the dynamic pat rules!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (main-lan,outside) source static mailserver interface service exchangetraffic exchangetraffic !&lt;/P&gt;&lt;P&gt;object network obj_any_main-lan&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (main-lan,outside) dynamic interface&lt;/P&gt;&lt;P&gt; object network obj_any-admin-dmz&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (admin-dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt; object network NAT4OM3 &lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (main-lan,outside) static interface service tcp https https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(my manual static nat rule, followed by my two dynamic pat rules (for inside and dmz) and the first of a few embedded NAT object rules).&amp;nbsp; By the way packet tracing worked fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jpegs to follow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/8/8/83880-mail1.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/8/8/83881-mail2.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 12:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883584#M457825</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-02T12:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT in 8.4.2</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883585#M457826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jounifoss,&amp;nbsp; the questions appear to be,,,,,,,,&lt;/P&gt;&lt;P&gt;How to setup the cisco so that outgoing mail traffic goes out 123.147, when there is a general dyamic pat rule guiding oubtound traffic out 123.146.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this more do to with routing rules then!&amp;nbsp; Where the router needs to know a route to 123.147 exists??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please discuss and answer the relationship here between,&amp;nbsp; dyanamic pat,&amp;nbsp; routing,&amp;nbsp; and manual static rules (and embedded Nat objects if need be).&amp;nbsp;&amp;nbsp;&amp;nbsp; I think ACLs is probably the least of worries most straightforward.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for mixups of course, without discerning the underlying requirements fully, its like urinating into the wind. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 12:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-in-8-4-2/m-p/1883585#M457826</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-02T12:47:07Z</dc:date>
    </item>
  </channel>
</rss>

