<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAT on PPPOE ( DHCP) interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837662#M460351</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not nate'd ....&amp;nbsp; Why my Nat statment is wrong ??&amp;nbsp; if wrong what is the correct one ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using ftp connection from outside and using the filezila ftp server and xp ftp client from outside for connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the CLI packet tracer info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet in outside tcp 8.8.8.8 1025 83.x.x.x 21&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 83.x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Feb 2012 23:29:56 GMT</pubDate>
    <dc:creator>imranbhatti151</dc:creator>
    <dc:date>2012-02-02T23:29:56Z</dc:date>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837646#M460335</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am first time using the new ASA IOS ( 8.4) and frankly i am in trouble&lt;/P&gt;&lt;P&gt;I have one PPPOE interface ( Ip assigned from DHCP) i want to use PAT on that interface and divert FTP traffic to the host inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can any one please help me in resolving this issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using below command but unfortuntely it is not working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ftp_server&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 21 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list FTP_IN extended permit tcp any object&amp;nbsp; ftp_server eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group FTP_IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Sh xlate &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP PAT from inside:172.16.93.12 21-21 to outside:83.x.x.x 21-21&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 0:07:14 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the&amp;nbsp; complete config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 1&lt;/P&gt;&lt;P&gt;72.16.93.0 255.255.255.0 10.175.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 172.16.93.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip 10.175.111.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any&lt;/P&gt;&lt;P&gt;172.16.93.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list FTP_IN extended permit tcp any object ftp_server eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network ftp_server&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ftp ftp&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group FTP_IN in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lookinf for support from community&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837646#M460335</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2019-03-11T22:21:42Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837647#M460336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NAT-Control is removed in 8.3|8.4 versions. Use these commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand your post correctly, you want to do a dynamic PAT of all hosts on the inside interface when they go out the outside. Use below commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network any-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 13:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837647#M460336</guid>
      <dc:creator>integreon</dc:creator>
      <dc:date>2012-01-31T13:49:00Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837648#M460337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want that someone come from outside on outside interface ip and it should directed to the inside host ( 172.16.93.12) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( for FTP)&amp;nbsp; As we do not have pool for the Global Ip addresses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 14:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837648#M460337</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-01-31T14:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837649#M460338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Imram,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Follow these steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1: Create a new object group for you web server. &lt;/P&gt;&lt;P&gt; (config)# object network ftpserver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Step 2: Add the IP of the web server to the network group. &lt;/P&gt;&lt;P&gt; (config-network-object)# host 172.16.93.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Step 3: Forward the port via the NAT command. &lt;/P&gt;&lt;P&gt;(config-network-object)# nat (inside,dmz) static interface service tcp ftp ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Step 4: Exit back to the root and add the access list &lt;/P&gt;&lt;P&gt; (config)# access-list outside_access_in permit tcp any object ftpserver eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Anton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 14:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837649#M460338</guid>
      <dc:creator>integreon</dc:creator>
      <dc:date>2012-01-31T14:44:30Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837650#M460339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Anton &lt;/P&gt;&lt;P&gt;Thanks for your reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done same setting but i am unable to connect from outside &lt;/P&gt;&lt;P&gt;i got hits in the implicit deny in the outside interface but no hit on the above access-list ( allowing for ftp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other possible reasons&amp;nbsp; ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 14:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837650#M460339</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-01-31T14:55:34Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837651#M460340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its because of this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you need to allow ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ourside_access_in permit tcp any object ftpserver eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 16:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837651#M460340</guid>
      <dc:creator>integreon</dc:creator>
      <dc:date>2012-01-31T16:04:20Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837652#M460341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Anton ,&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already added this acl &lt;/P&gt;&lt;P&gt;but hit count is increasing on the deny statment not on the allow statment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;very surprise to me ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure what exactly be the resaon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 17:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837652#M460341</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-01-31T17:15:51Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837653#M460342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Imran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share your full configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 17:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837653#M460342</guid>
      <dc:creator>integreon</dc:creator>
      <dc:date>2012-01-31T17:30:38Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837654#M460343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you share the output of:&lt;/P&gt;&lt;P&gt;show run access-group&lt;/P&gt;&lt;P&gt;show access-list FTP_IN &lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said you don't see hit counts on the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like you have these two ACLs;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list FTP_IN extended permit tcp any object ftp_server eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the first one is applied inbound to the outside interface, the second one is not applied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Captures and packet-tracer migth help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit tcp any ftp_public_IP eq ftp&lt;/P&gt;&lt;P&gt;capture test access-list capture interface outside&lt;/P&gt;&lt;P&gt;show cap test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet in outside tcp 8.8.8.8 1025 ftp_public_IP 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2012 23:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837654#M460343</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-01-31T23:59:43Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837655#M460344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the show xlate we can see the translation being built.&lt;/P&gt;&lt;P&gt;On the access-groups you have the following:&lt;/P&gt;&lt;P&gt;access-group FTP_IN in interface outside&lt;/P&gt;&lt;P&gt;access-list FTP_IN extended permit tcp any object ftp_server eq ftp&lt;/P&gt;&lt;P&gt;So the ACL is only allowing connections to the FTP server on port 21 witch is what you are looking for.&lt;/P&gt;&lt;P&gt;If you do a ASP capture you will see if the ASA is dropping the packets witch you have this configured like you posted on this post, it should not be happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the capture you need to make and then attempt a connection:&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;Try to connect to the FTP server from the outside and finally provide us the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show cap asp&amp;nbsp;&amp;nbsp; | include x.x.x.x ( Ip address of the host you made the connection from)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 01:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837655#M460344</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-01T01:59:38Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837656#M460345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI ALL,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the detail config and the packet trace&lt;/P&gt;&lt;P&gt;It seems some NAT error but i am not sure why the nat error ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking forward for your support&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/3/3/8/74833-ptrace.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.93.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; pppoe client vpdn group ISP&lt;/P&gt;&lt;P&gt; ip address pppoe setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.175.111.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network uaelan&lt;/P&gt;&lt;P&gt; subnet 172.16.93.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network dmz_net&lt;/P&gt;&lt;P&gt; subnet 10.175.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ftpserver&lt;/P&gt;&lt;P&gt; host 172.16.93.12&lt;/P&gt;&lt;P&gt;object-group network dmz&lt;/P&gt;&lt;P&gt; network-object 10.175.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network inside&lt;/P&gt;&lt;P&gt; network-object 172.16.93.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 172.16.93.0 255.255.255.0 10.175.111.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 172.16.93.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip 10.175.111.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any 172.16.93.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object ftpserver eq ftp &lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network ftpserver&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ftp ftp &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpdn group ISP request dialout pppoe&lt;/P&gt;&lt;P&gt;vpdn group ISP localname ASA842&lt;/P&gt;&lt;P&gt;vpdn group ISP ppp authentication pap&lt;/P&gt;&lt;P&gt;vpdn username ASA842 password ***** store-local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.93.101-172.16.93.250 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 172.16.93.12 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 691200 interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 06:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837656#M460345</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-02-01T06:09:20Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837657#M460346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet-tracer should be pointing to the outside interface of your asa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do it again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 14:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837657#M460346</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-01T14:30:07Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837658#M460347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It shows some implicit deny rule error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh accesss-list outside_access_in &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in; 2 elements; name hash: 0x6892a938&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any object ftpserver eq&lt;/P&gt;&lt;P&gt; ftp log notifications interval 300 (hitcnt=0) 0x33d02b01&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in line 1 extended permit tcp any host 172.16.93.12&lt;/P&gt;&lt;P&gt; eq ftp log notifications interval 300 (hitcnt=1) 0x33d02b01&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 2 extended deny ip any any log informational&lt;/P&gt;&lt;P&gt;interval 300 (hitcnt=106) 0x2c1c6a65&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the snapsohot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/4/9/74944-ptrace1.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 14:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837658#M460347</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-02-01T14:50:43Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837659#M460348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Imra,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any object ftpserver eq&lt;/P&gt;&lt;P&gt; ftp log notifications interval 300 (hitcnt=0) 0x33d02b01&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Please do the following:&lt;/P&gt;&lt;P&gt;no access-list outside_access_in line 1 extended permit tcp any object ftpserver eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1&amp;nbsp; permit tcp any host 172.16.93.12 eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then give it a try!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 17:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837659#M460348</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-01T17:33:43Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837660#M460349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear julio &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;still the same issue, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;not able to connect ftp rom outiside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thing is wrong , why packet stuck on implicit denty policy of outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what should i do now ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now below is the access-list ( Outside_access_in )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in; 1 elements; name hash: 0x6892a938&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any host 172.16.93.12 e&lt;/P&gt;&lt;P&gt;q ftp (hitcnt=0) 0xbd7b5852&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and sh nat details&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;/P&gt;&lt;P&gt;1 (DMZ) to (outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 0.0.0.0/0, Translated: 83.X.X.X/32&lt;/P&gt;&lt;P&gt;2 (inside) to (outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 320653, untranslate_hits = 51063&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 0.0.0.0/0, Translated: 83.X.X.X/32&lt;/P&gt;&lt;P&gt;3 (inside) to (DMZ) source static any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 20117, untranslate_hits = 19926&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 0.0.0.0/0, Translated: 0.0.0.0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;/P&gt;&lt;P&gt;1 (inside) to (outside) source static ftpserver interface&amp;nbsp;&amp;nbsp; service tcp ftp ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.16.93.12/32, Translated: 83.X.X.X/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: ftp Mapped: ftp&lt;/P&gt;&lt;P&gt;2 (any) to (outside) source dynamic obj_any interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 0.0.0.0/0, Translated: 83.X.X.X/32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh run nat &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,DMZ) source static any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (any,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network ftpserver&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ftp ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh xlate | incl 172.16.93.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP PAT from inside:172.16.93.12 21-21 to outside:83.x.x.x 21-21&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 22:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837660#M460349</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-02-02T22:00:30Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837661#M460350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Can you try the the packet tracer on the CLI so we can see the full output?&lt;/P&gt;&lt;P&gt;The packet is hitting the implicit rule because it's not being NAT'ed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet in outside tcp 8.8.8.8 1025 83.x.x.x 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is the FTP active or passive? Client outside or inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 23:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837661#M460350</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-02-02T23:16:18Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837662#M460351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not nate'd ....&amp;nbsp; Why my Nat statment is wrong ??&amp;nbsp; if wrong what is the correct one ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using ftp connection from outside and using the filezila ftp server and xp ftp client from outside for connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the CLI packet tracer info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet in outside tcp 8.8.8.8 1025 83.x.x.x 21&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 83.x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 23:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837662#M460351</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-02-02T23:29:56Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837663#M460352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Why do you have:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have:&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;nat (any,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you remove this NAT and try the packet tracer again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;packet in outside tcp 8.8.8.8 1025 83.x.x.x 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using NAT and FTP there are some things to take in consideration.&lt;/P&gt;&lt;P&gt;FTP uses port 21 to establish the connection but uses a random port for data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to find out if it is passive or active. Also port forwarding for a range of ports might be needed.&lt;/P&gt;&lt;P&gt;A one-to-one NAT is preferred.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 23:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837663#M460352</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-02-02T23:56:57Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837664#M460353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok understood&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i remove&amp;nbsp; &lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would it stop all the hosts "inside"&amp;nbsp; to use internet using PAT ( on outside interface) ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that for data Ftp use different port but we cannot have one to one nat as due to non availaibility of global Ip addresses ( only interface ip address) can be used for incoming traffic .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 00:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837664#M460353</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-02-03T00:09:51Z</dc:date>
    </item>
    <item>
      <title>PAT on PPPOE ( DHCP) interface</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837665#M460354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok i remove that statment below is the packet trace output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 83.x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 00:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-pppoe-dhcp-interface/m-p/1837665#M460354</guid>
      <dc:creator>imranbhatti151</dc:creator>
      <dc:date>2012-02-03T00:25:31Z</dc:date>
    </item>
  </channel>
</rss>

