<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Tracer NAT fail - WTF? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903751#M458106</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Redid packet trace with correct destination. Success, except REAL WORLD test FAILED. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way what the heck is unnat lookup in the packet tracer. I ran a different trace than the one shown. It seemed to recognize the nat rule (5080 80) but did more than just lookup because at the nat rule proper after acl processing it used the nat rule (5080 5080) which is a rule intended for other users that dont have outgoing port restrictions). Very confused.&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/0/4/81401-natsucceed1.jpg" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/0/4/81402-natsucceed2.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Mar 2012 13:45:26 GMT</pubDate>
    <dc:creator>llamaw0rksE</dc:creator>
    <dc:date>2012-03-16T13:45:26Z</dc:date>
    <item>
      <title>Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903739#M458081</link>
      <description>&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/4/5/3/81354-natfail1.jpg" alt="natfail1.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before I changed all my service tcp objects from identifying both source and destination ports to simply SOURCE ports, and after I made the changes the packet trace was the same so that is not my issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my latest runconfig.&amp;nbsp; I was sure my NAT rules were right&amp;nbsp; (8.43)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname AgileDevelopment&lt;/P&gt;&lt;P&gt;enable password SrnWJ82Q9IsDq97j encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no forward interface Vlan12&lt;/P&gt;&lt;P&gt; nameif main-lan&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.24.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address ab.abc.def.230 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; nameif admin-dmz&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone AST -2&lt;/P&gt;&lt;P&gt;clock summer-time ADT recurring&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network obj_any_main-lan&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; description Applied by router ---&amp;gt; SNAT for main lan&lt;/P&gt;&lt;P&gt;object network TrustedInternetUsers&lt;/P&gt;&lt;P&gt; subnet ab.abc.def.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Corporate-user&lt;/P&gt;&lt;P&gt; host .98&lt;/P&gt;&lt;P&gt; description Corp Ojbect for access to TFS, OM&lt;/P&gt;&lt;P&gt;object network 3-remote-h&lt;/P&gt;&lt;P&gt; subnet .0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 3-remote-w&lt;/P&gt;&lt;P&gt; subnet .0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 1-remote&lt;/P&gt;&lt;P&gt; host .4&lt;/P&gt;&lt;P&gt;object network 2-remote&lt;/P&gt;&lt;P&gt; host .133&lt;/P&gt;&lt;P&gt;object network ISP-GatewayIP&lt;/P&gt;&lt;P&gt; host ab.abc.def.225&lt;/P&gt;&lt;P&gt;object network VS-pcIP&lt;/P&gt;&lt;P&gt; host 192.168.24.34&lt;/P&gt;&lt;P&gt;object network obj_any-admin-dmz&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt; description Used to apply SNAT for DMZ (internet access)&lt;/P&gt;&lt;P&gt;object service input-port&lt;/P&gt;&lt;P&gt; service tcp source eq www &lt;/P&gt;&lt;P&gt;object service OM1&lt;/P&gt;&lt;P&gt; service tcp source eq 5080 &lt;/P&gt;&lt;P&gt;object service OM2&lt;/P&gt;&lt;P&gt; service tcp source eq 8088 &lt;/P&gt;&lt;P&gt;object service OM3&lt;/P&gt;&lt;P&gt; service tcp source eq https &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object service TFS&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; service tcp source eq 8080&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;object service RDP&lt;/P&gt;&lt;P&gt; service tcp source eq 3389 &lt;/P&gt;&lt;P&gt;object service RouterAdmin&lt;/P&gt;&lt;P&gt; service tcp source eq 3334&lt;/P&gt;&lt;P&gt;object network NAT4OM3&lt;/P&gt;&lt;P&gt; host 192.168.24.34&lt;/P&gt;&lt;P&gt;object network NAT4OM1&lt;/P&gt;&lt;P&gt; host 192.168.24.34&lt;/P&gt;&lt;P&gt;object network NAT4OM2&lt;/P&gt;&lt;P&gt; host 192.168.24.34&lt;/P&gt;&lt;P&gt;object network NAT4RDP&lt;/P&gt;&lt;P&gt; host 192.168.24.34&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-size: 12pt;"&gt;&lt;STRONG&gt;object network NAT4TFS&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-size: 12pt;"&gt;&lt;STRONG&gt; host 192.168.24.34&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;object network NAT4WWW2OM1&lt;/P&gt;&lt;P&gt; host 192.168.24.34&lt;/P&gt;&lt;P&gt;object-group network Router-Admin&lt;/P&gt;&lt;P&gt; description Remote access to adjust router settings&lt;/P&gt;&lt;P&gt; network-object object 2-remote&lt;/P&gt;&lt;P&gt; network-object object TrustedInternetUsers&lt;/P&gt;&lt;P&gt;object-group network TFS-usergroup&lt;/P&gt;&lt;P&gt; description DND Access TFS, Open Meetings and RDP&lt;/P&gt;&lt;P&gt; network-object object TrustedInternetUsers&lt;/P&gt;&lt;P&gt; network-object object 3-remote-h&lt;/P&gt;&lt;P&gt; network-object object 3-remote-w&lt;/P&gt;&lt;P&gt; network-object object 1-remote&lt;/P&gt;&lt;P&gt; network-object object 2-remote&lt;/P&gt;&lt;P&gt;object-group service OMServiceGroup&lt;/P&gt;&lt;P&gt; service-object object OM1 &lt;/P&gt;&lt;P&gt; service-object object OM2 &lt;/P&gt;&lt;P&gt; service-object object OM3 &lt;/P&gt;&lt;P&gt;object-group service CorporateServiceGroup&lt;/P&gt;&lt;P&gt; service-object object OM2 &lt;/P&gt;&lt;P&gt; service-object object OM3 &lt;/P&gt;&lt;P&gt; service-object object input-port &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Access to VS-TFS&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit object TFS object-group TFS-usergroup object VS-pcIP&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object RDP object-group TFS-usergroup object VS-pcIP &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit object TFS object Corporate-user object VS-pcIP&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Access to Open Meetings&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group OMServiceGroup object-group TFS-usergroup object VS-pcIP &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group CorporateServiceGroup object Corporate-user object VS-pcIP &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark remote access to VS&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu main-lan 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu admin-dmz 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network obj_any_main-lan&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; nat (main-lan,outside) dynamic interface&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;object network obj_any-admin-dmz&lt;/P&gt;&lt;P&gt; nat (admin-dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network NAT4OM3&lt;/P&gt;&lt;P&gt; nat (main-lan,outside) static interface service tcp https https &lt;/P&gt;&lt;P&gt;object network NAT4OM1&lt;/P&gt;&lt;P&gt; nat (main-lan,outside) static interface service tcp 5080 5080 &lt;/P&gt;&lt;P&gt;object network NAT4OM2&lt;/P&gt;&lt;P&gt; nat (main-lan,outside) static interface service tcp 8088 8088 &lt;/P&gt;&lt;P&gt;object network NAT4RDP&lt;/P&gt;&lt;P&gt; nat (main-lan,outside) static interface service tcp 3389 3389 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-size: 12pt;"&gt;&lt;STRONG&gt;object network NAT4TFS&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-size: 12pt;"&gt;&lt;STRONG&gt; nat (main-lan,outside) static interface service tcp 8080 8080 &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;object network NAT4WWW2OM1&lt;/P&gt;&lt;P&gt; nat (main-lan,outside) static interface service tcp 5080 www &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 ab.abc.def.225 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable 3334&lt;/P&gt;&lt;P&gt;http server session-timeout 60&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 admin-dmz&lt;/P&gt;&lt;P&gt;http 192.168.24.0 255.255.255.0 main-lan&lt;/P&gt;&lt;P&gt;http .133 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http ab.abc.def.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.24.0 255.255.255.0 main-lan&lt;/P&gt;&lt;P&gt;ssh .133 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh ab.abc.def.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.2.0 255.255.255.0 admin-dmz&lt;/P&gt;&lt;P&gt;ssh timeout 10&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.24.5-192.168.24.10 main-lan&lt;/P&gt;&lt;P&gt;dhcpd dns ab.0.0.96 ab.0.0.97 interface main-lan&lt;/P&gt;&lt;P&gt;dhcpd enable main-lan&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns ab.0.0.96 ab.0.0.97 interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.2.5-192.168.2.10 admin-dmz&lt;/P&gt;&lt;P&gt;dhcpd dns ab.0.0.96 ab.0.0.97 interface admin-dmz&lt;/P&gt;&lt;P&gt;dhcpd enable admin-dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 209.87.233.53 source outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username user5- password Xl5915GPBhncsPAQ encrypted&lt;/P&gt;&lt;P&gt;username user3- password mAVJxjP/lM8yc59F encrypted&lt;/P&gt;&lt;P&gt;username user4- password w7V/UFyrOwnQknqm encrypted&lt;/P&gt;&lt;P&gt;username user2- password .NJvJ7zi.ROsatP7 encrypted&lt;/P&gt;&lt;P&gt;username user1- password OZCdJRBWiCmcaFZ. encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:9cb5b5e2fb04a7c463aa077743174534&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903739#M458081</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2019-03-11T22:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903740#M458085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not clear on why you have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif; padding-left: 30px;"&gt;&lt;STRONG style="border-collapse: collapse; list-style-type: none;"&gt;object network obj_any_main-lan&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif; padding-left: 30px;"&gt;&lt;STRONG style="border-collapse: collapse; list-style-type: none;"&gt;subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't it be "subnet 192.168.24.0 255.255.255.0"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm wondering if that's giving the packet-tracer the issue with failing rpf-check (even though you don't have unicast RPF enabled globally).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 17:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903740#M458085</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-03-15T17:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903741#M458088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marvin,&amp;nbsp; I suppose looking at the 6.4 ADSM manual that would be a good assumption.&lt;/P&gt;&lt;P&gt;By default though I believe the ASA 5505 in 8.43 has some default rules already in place.......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link closest to what resembles mine......&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b7c91b.shtml" rel="nofollow"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b7c91b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network OBJ_GENERIC_ALL &lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic OBJ_GENERIC_ALL interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Basically all I did was rename the inside lan to main-lan.&lt;/P&gt;&lt;P&gt;As you can see I created the same dynamic pat rule for my dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They work in that although I cannot get inbound traffic, I can get from hosts on the lan and dmz to the internet and the return traffic as well&amp;nbsp; (combo of the above rules and default route 0.0.0.0 0.0.0.0 wanip gatewayIP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a better reference:&lt;BR /&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b1ee95.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b1ee95.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 18:43:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903741#M458088</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-15T18:43:24Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903742#M458090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer should test :&amp;nbsp; SRC : any&amp;nbsp;&amp;nbsp; DST : ab.abc.def.230 tcp 8080 , not the internal/nated Destination&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 19:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903742#M458090</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-03-15T19:22:27Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903743#M458091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a private server............&amp;nbsp;&amp;nbsp; Someone from the outside (authorized user via ACL) is going to attempt to, in an unsolicited manner, reach my private internal server.&amp;nbsp; Why would you test the other way???&amp;nbsp;&amp;nbsp;&amp;nbsp; If it doesnt work getting in, doesnt matter about getting out....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any case do you see any fundamental flaws with my config setup??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 19:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903743#M458091</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-15T19:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903744#M458092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your packet tracer on your print screen test:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source interface OUTSIDE , Source IP&amp;nbsp; x.x.x.98 ( you left only the last octet ) , Source Port TCP/8080 ,&amp;nbsp; Destination IP 192.168.24.34 , Destination Port TCP/8080.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per your configured nat - and my understanding :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP/8080 192.168.24.34 is STATIC nat-ed to the OUTSIDE interface&lt;/P&gt;&lt;P&gt;So in order for a packet to arrive from OUTSIDE to INSIDE destination 192.168.24.34 TCP/8080 , my understanding is that the source that is located in the OUTSIDE should use as DESTINATION address the OUTSIDE interface of the ASA (&amp;nbsp; in your config ab.abc.def.230 ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 20:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903744#M458092</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-03-15T20:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903745#M458093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Interesting you should point that out.&lt;/P&gt;&lt;P&gt; In my unseen packet tests I used both authorized (as the one shown) and unauthorized external IPs..........&amp;nbsp;&amp;nbsp; How else would one know if the ACL is working or not. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh I see, your talking about the destination choices in the packet tracer itself...... Good question!&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well in response, remember the first choice you make is which interface to start from.&amp;nbsp; As you can see I chose the outside interface and thus the packet tracer should know thats where the packet from an external user will show up............&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So delineating it twice didnt make sense to me and the fact that the flavour of everything 8.4 is use real IP vice mapped IP.&lt;/P&gt;&lt;P&gt;I can try it tomorrow to see what happens if&amp;nbsp; I make the destination the wanip of the router......&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 20:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903745#M458093</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-15T20:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903746#M458096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I know , 8.4 version , reacts as a 7.0 version with nat-control disabled : that is no nat is required , but if it's in place will be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a look at 8.4 configuration guide :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"NAT is not required. If you do not configure NAT for a given set of traffic, that traffic will not be translated"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not your case , because you have configured NAT static for that inside host TCP/8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a conclusion : I belive that is you try again packet tracer with the same input interface ( outside ) and the same source , BUT with the IP destination of the ASA's interface and port tcp/8080 will pass the NAT .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 21:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903746#M458096</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-03-15T21:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903747#M458097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Will try that tomorrow and report back. Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 21:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903747#M458097</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-15T21:11:24Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903748#M458099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan has it right. I overlooked that bit in the jpeg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to present packet-tracer the characteristics of the packet as it is received on the outside interface. It will take care of parsing the configuration and determining that the packet gets natted as it flows through the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 23:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903748#M458099</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-03-15T23:50:25Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903749#M458102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Can you comment on my ACLS........&amp;nbsp; the fact that my service or service group is in themiddle and the object dest IP is at the end........ ASDM magic but difff from the docs Im reading.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 10:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903749#M458102</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-16T10:43:13Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903750#M458104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all I would be very curious to know the result of the&amp;nbsp; test - related to NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the ACL , I didn't understood your remark.&amp;nbsp; Your issue is that the obj service is at the beging ? Because the network services objects are on the correct order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 11:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903750#M458104</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-03-16T11:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903751#M458106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Redid packet trace with correct destination. Success, except REAL WORLD test FAILED. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way what the heck is unnat lookup in the packet tracer. I ran a different trace than the one shown. It seemed to recognize the nat rule (5080 80) but did more than just lookup because at the nat rule proper after acl processing it used the nat rule (5080 5080) which is a rule intended for other users that dont have outgoing port restrictions). Very confused.&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/1/0/4/81401-natsucceed1.jpg" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/0/4/81402-natsucceed2.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 13:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903751#M458106</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-16T13:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903752#M458107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; My remark about ACLs is that if I put in an an acl that states (global implicit any any permit), just before the default deny one..&amp;nbsp; The traffic failure above gets through.&amp;nbsp; So I am thinking still its an acl issue of sorts............ &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 13:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903752#M458107</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-16T13:56:07Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903753#M458109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are talking about this flow ( 8080 ) that yes it is also related to ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your &lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;outside_access_in &lt;/STRONG&gt;acl SHOULD permit &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp object-group TFS-usergroup host x.x.x.230 eq 8080.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do not forget that the packet arrives in outside interface is check by the access-list and then destination IP translated to the one of the INSIDE host (192.168.24.34)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 14:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903753#M458109</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-03-16T14:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer NAT fail - WTF?</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903754#M458110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem solved.&lt;BR /&gt;Initially my service ports were both source and destination.&lt;BR /&gt;Upon advice I changed these all to source.&lt;BR /&gt;Today I tried changing them all to destination. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why you ask, because when for giggles I wanted to recreate the rule I was testing in CLI - using putty,&amp;nbsp; I simply modified the existing rule by using a default service (Citrex).&amp;nbsp; Lo and behold for the first time I got a service rule that looked familiar....&amp;nbsp; ended with "eq citrix."&lt;/P&gt;&lt;P&gt;The moral, is CLI is for dummies but use it because it will help you in ASDM troubleshooting LOL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(I then noticed all the default rules were set for destination) &lt;/P&gt;&lt;P&gt;I was able to change all my service ports to destination except ONE,, you guessed it the main one I was testing.&lt;BR /&gt;I kept getting ipv6 errors associated when trying to change it to destination.&amp;nbsp; HOW WEIRD is that.&amp;nbsp; So I deleted it and reinserted it.&lt;/P&gt;&lt;P&gt;Packet trace - good&lt;BR /&gt;Real test - success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so service objects should all be shown on runconfig as.......&lt;/P&gt;&lt;P&gt;service tcp destination eq xxxx&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Oh and by the way, my ACL rules did not change format.&amp;nbsp; They were good the whole time, it was by service ports that were effed up.&lt;/P&gt;&lt;P&gt;Thanks for all your patience on round one, now the simple ipsec and ssl vpn saga begins.&amp;nbsp; I hope to heck remote managment works LOL. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 15:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-nat-fail-wtf/m-p/1903754#M458110</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-16T15:23:11Z</dc:date>
    </item>
  </channel>
</rss>

