<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dynamic NAT on ASA 8.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842023#M459187</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I can see on the first post, You want to be able to go to the outside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So on the No_nat rules you only need the networks for the VPN, nothing more. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Also&amp;nbsp; &lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 4.28.x.x 255.255.255.252&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;is the network for my ISP&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are you doing that??? I mean traffic should get nat it, dont you think-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 18 Feb 2012 03:23:19 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-02-18T03:23:19Z</dc:date>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842020#M459182</link>
      <description>&lt;P&gt;I can't figure out why the ASA cannot send traffic to the internet with the below config. What did I do wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 4.28.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.18.170.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VibraRemote_splitTunnelAcl standard permit 172.18.170.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Level3-SIP 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip Level3-SIP 255.255.255.0 172.18.170.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 4.28.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 172.18.170.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Corporate 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Poway 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 LaSierra 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Fontana 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 MorenoValley 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Woodcrest 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 HighDesert 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 172.18.193.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Westminster 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Lakewood 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (Outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 4.28.x.x 1&lt;/P&gt;&lt;P&gt;route Inside Level3-SIP 255.255.255.0 172.18.170.3 1&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842020#M459182</guid>
      <dc:creator>jasonww04</dc:creator>
      <dc:date>2019-03-11T22:31:38Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842021#M459183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are there any NAT 0 access lists that specify the destination you're tryin to reach?&amp;nbsp; The PAT configuration is correct.&amp;nbsp; Try a packet tracer and see what NAT configurations it hits &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Feb 2012 19:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842021#M459183</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2012-02-17T19:18:58Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842022#M459185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There aren't but the line &lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 4.28.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt;is the network for my ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I took it out and I still can't ping. I'm trying "ping Inside 75.71.47.74"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Feb 2012 19:30:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842022#M459185</guid>
      <dc:creator>jasonww04</dc:creator>
      <dc:date>2012-02-17T19:30:48Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842023#M459187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I can see on the first post, You want to be able to go to the outside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So on the No_nat rules you only need the networks for the VPN, nothing more. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Also&amp;nbsp; &lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 4.28.x.x 255.255.255.252&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;is the network for my ISP&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are you doing that??? I mean traffic should get nat it, dont you think-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 03:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842023#M459187</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-18T03:23:19Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842024#M459188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why are you performing a "ping Inside 75.71.47.74"?&amp;nbsp; This command is sourcing a ping from the inside interface which is exempt from NAT so I would expect this to be PAT'd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 03:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842024#M459188</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2012-02-18T03:28:19Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842025#M459189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Err, I meant to say that I would expect that traffic NOT to be PAT'd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Feb 2012 03:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842025#M459189</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2012-02-18T03:29:10Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842026#M459191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is what my ACL looks like now and still users can't get out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Level3-SIP 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip Level3-SIP 255.255.255.0 172.18.170.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 172.18.170.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Corporate 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Poway 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 LaSierra 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Fontana 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 MorenoValley 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Woodcrest 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 HighDesert 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 172.18.193.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Westminster 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 172.18.170.0 255.255.255.0 Lakewood 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Feb 2012 15:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842026#M459191</guid>
      <dc:creator>jasonww04</dc:creator>
      <dc:date>2012-02-20T15:26:20Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842027#M459193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How would I test if my NAT is correct if I don't start the ping from the inside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 15:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842027#M459193</guid>
      <dc:creator>jasonww04</dc:creator>
      <dc:date>2012-02-21T15:27:07Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842028#M459195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can use the packet-tracer command on the ASA to check if the NAT is correct or not for any specific soruce and destination.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 15:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842028#M459195</guid>
      <dc:creator>Amit Rai</dc:creator>
      <dc:date>2012-02-21T15:29:36Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842029#M459197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Packet tracer makes no sense to me at all. Here is the result of packet tracer going to an external IP. Why is there no NAT Phase but there is a VPN Phase when 75.71.47.74 cannot be reached through any configured VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewallmchpa# packet-tracer input Outside icmp 172.18.170.1 8 0 75.71.47.74 d$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xab7e3f20, priority=3, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xab7e5a08, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=351541, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xab7e5680, priority=66, domain=inspect-icmp-error, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12878, user_data=0xab7e5568, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xac1465f8, priority=12, domain=ipsec-tunnel-flow, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=141699, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 146737, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: Outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 16:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842029#M459197</guid>
      <dc:creator>jasonww04</dc:creator>
      <dc:date>2012-02-21T16:46:35Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842030#M459199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This will probably sound fairly stupid, but I have run into this at least 3 times in the past with new ASA installations. I always had to reboot the ASA once before the NAT would actually function if I set it up after it was already plugged in, otherwise the NAT setup looks perfectly fine assuming your NAT exemptions don't match the thing you are trying to hit. You may want to do testing with something like 4.2.2.2 so you know it will respond to ICMP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 16:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842030#M459199</guid>
      <dc:creator>Keith McElroy</dc:creator>
      <dc:date>2012-02-21T16:58:28Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842031#M459201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there something in the ASA equivalent to a router's clear ip nat translations *?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 17:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842031#M459201</guid>
      <dc:creator>jasonww04</dc:creator>
      <dc:date>2012-02-21T17:15:50Z</dc:date>
    </item>
    <item>
      <title>Dynamic NAT on ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842032#M459202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is, you clear the xlate, but this never worked when I tried it. It seemed to always be that the NAT process wouldn't start unless it had been enabled from boot. I can only assume it is part of the way the code is made and it must boot with the box. Then again, it could have been just multiple flukes, but I suspect it is an actual issue with how the code loads on the ASA. Best bet would be to just save the config and do a quick reboot, really doesn't hurt much considering it doesn't work right now anyway. I never tried, but you can probably check the CPU processes and look for something related to NAT, although it may be stuck under an IP process of some sort, therefore not transparent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Feb 2012 17:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-on-asa-8-2/m-p/1842032#M459202</guid>
      <dc:creator>Keith McElroy</dc:creator>
      <dc:date>2012-02-21T17:19:33Z</dc:date>
    </item>
  </channel>
</rss>

