<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5505 8.4.2 nat (outside,inside) black hole in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828496#M492373</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio, this traffic is not being sourced from a VPN tunnel. It is regular traffic traversing the internet. There are some other IP addresses provided by my ISP. I could try another if you think the one I'm using is defective. I do not have the luxury of a different public network however.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied your suggested changes (making sure to replace the XXX's with the ISP provided public outside address and here are the results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show capture capin"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet captured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet shown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show capture capout"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet captured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet shown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show capture asp"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;413 packets captured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; 1: 18:47:26.728798 9afd.43ad.b4c9 1503.0100.1630 0x80e9 27:&amp;nbsp; Drop-reason: (np-socket-closed) Dropped pending packets in a closed socket&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; 2: 18:47:26.729469 802.1Q vlan#1 P0 192.168.23.5.4438 &amp;gt; 192.168.23.3.443: F 2125777054:2125777054(0) ack 2832524426 win 64836 Drop-reason: (tcp-not-syn) First TCP packet not SYN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;etcetera, etcetera&amp;nbsp; &lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; 72: 18:49:25.494954 802.1Q vlan#1 P0 192.168.23.5.137 &amp;gt; 192.168.23.255.137:&amp;nbsp; udp 50 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; 73: 18:49:26.244677 802.1Q vlan#1 P0 192.168.23.5.137 &amp;gt; 192.168.23.255.137:&amp;nbsp; udp 50 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Nov 2011 01:04:33 GMT</pubDate>
    <dc:creator>mellison</dc:creator>
    <dc:date>2011-11-29T01:04:33Z</dc:date>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828488#M492365</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;I am new to the ASA series and I am at a complete loss as to why I cannot configure this router to forward SMTP and RDP traffic to an internal host. &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;The packet trace tool in ASDM shows complete end-to-end connectivity for RDP but it still fails to connect from outside. Would someone please take a look at my config file and tell me what I'm doing wrong and what I need to change in order to make it work?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Attached is the RDP packet trace and the config file. Thanks in advance for your help &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828488#M492365</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2019-03-11T21:55:42Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828489#M492366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I work with this scenarios every day and I can tell you that the nat statements using ANY can generate a lot of issues, so I would recommend you to be more specific and instead of using ANY use the right interface name (Inside,Outside,etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the problem here is this part of the configuration:&lt;/P&gt;&lt;P&gt;object service RDP&lt;/P&gt;&lt;P&gt; service tcp destination eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are going to nat the source IP and Port so instead of service tcp destination it should be source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try that and let me know the result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 02:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828489#M492366</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-28T02:17:09Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828490#M492367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. I don't understand what you mean. Kindly please give me an example of your suggestion based on the RDP section of my configuration file. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 02:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828490#M492367</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-28T02:56:41Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828491#M492368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration its fine, the only problem I could see is the Object service configuration, instead of using :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service tcp destination eq 3389 &lt;/P&gt;&lt;P&gt;USE&lt;/P&gt;&lt;P&gt;service tcp source eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 18:06:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828491#M492368</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-28T18:06:37Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828492#M492369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied your suggested change:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service RDP&lt;/P&gt;&lt;P&gt; service tcp source eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then copied running config to startup config, cleared xlate and reloaded. Port forwarding is still not working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the outside interface, I have remote access by vpn client but no port forwarding pleasure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;I look forward to fully rating a helpful post. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 22:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828492#M492369</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-28T22:23:02Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828493#M492370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what you need to have on the configuration, until you have this, the connections coming from the outside to port 3389&amp;nbsp; on&amp;nbsp; the outside IP address are not going to work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SBS-RDP&lt;/P&gt;&lt;P&gt; host 192.168.23.18&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service RDP&lt;/P&gt;&lt;P&gt; service tcp source eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (outside,inside) source static any any destination static interface SBS-RDP service RDP RDP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static SBS-RDP interface service&amp;nbsp; RDP&amp;nbsp; RDP&lt;/P&gt;&lt;P&gt;192.168.5.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 22:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828493#M492370</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-28T22:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828494#M492371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your timely reply Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enthusiastically applied your suggested changes but no happy ending &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;. Here is a sample of the config file with your suggestions in bold itialics:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.23.0_24&lt;/P&gt;&lt;P&gt; subnet 192.168.23.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.10.10.0_24&lt;/P&gt;&lt;P&gt; subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description IPSec VPN&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network SBS-SMTP&lt;/P&gt;&lt;P&gt; host 192.168.23.18&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;object service RDP&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt; service tcp source eq 3389&lt;/STRONG&gt;&lt;/EM&gt; &lt;/P&gt;&lt;P&gt;object service SMTP&lt;/P&gt;&lt;P&gt; service tcp destination eq smtp &lt;/P&gt;&lt;P&gt;object service 987&lt;/P&gt;&lt;P&gt; service tcp destination eq 987 &lt;/P&gt;&lt;P&gt;object service HTTPS444&lt;/P&gt;&lt;P&gt; service tcp destination eq 444 &lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;object network SBS-RDP&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt; host 192.168.23.18&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;object network SBS-HTTPS444&lt;/P&gt;&lt;P&gt; host 192.168.23.18&lt;/P&gt;&lt;P&gt;object network SBS-987&lt;/P&gt;&lt;P&gt; host 192.168.23.18&lt;/P&gt;&lt;P&gt;access-list SPS-Remote_SplitTunnelAcl standard permit 192.168.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list SPS-Remote_SplitTunnelAcl standard permit 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object SBS-SMTP eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object SBS-RDP eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object SBS-HTTPS444 eq 444 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object SBS-987 eq 987 &lt;/P&gt;&lt;P&gt;access-list outside_Nat0_outbound extended permit ip any 192.168.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_Nat0_outbound extended permit ip any 192.168.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_Nat0_outbound_1 extended permit ip 192.168.23.0 255.255.255.0 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 10.10.10.0 255.255.255.0 192.168.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Allow VPN traffic inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.23.0 255.255.255.0 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit ip object NETWORK_OBJ_10.10.10.0_24 192.168.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in_2 extended permit object RDP any any log alerts &lt;/P&gt;&lt;P&gt;access-list outside_access_in_2 extended permit object SMTP any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in_2 extended permit object 987 any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in_2 extended permit object HTTPS444 any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in_2 extended permit ip object NETWORK_OBJ_10.10.10.0_24 object NETWORK_OBJ_192.168.23.0_24 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-Pool 10.10.10.1-10.10.10.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645-206.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;nat (inside,outside) source static SBS-RDP interface service RDP RDP&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;nat (any,any) source static NETWORK_OBJ_10.10.10.0_24 NETWORK_OBJ_10.10.10.0_24 destination static NETWORK_OBJ_192.168.23.0_24 NETWORK_OBJ_192.168.23.0_24&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface SBS-SMTP service SMTP SMTP&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface SBS-HTTPS444 service HTTPS444 HTTPS444&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface SBS-987 service 987 987&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in_2 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What could possibly be missing or in need of changing? The ASDM Syslog shows internal and vpn connected activity. How do I configure ASDM to show me the dropped packets from tcp/3389 outside traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 00:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828494#M492371</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-29T00:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828495#M492372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way that we could use another IP address instead of the Outside ip address on the Nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This traffic is not being sourced from a VPN tunnel right, it is regular traffic comming from the internet.&lt;/P&gt;&lt;P&gt;Now lets do a capture to see what is going on because this should be up and running, in the access-list the xxx is the outside IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host 76.185.77.99 host 192.168.23.18&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host 192.168.23.18 host 76.185.77.99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capout permit tcp host 76.185.77.99 host xxxxxx&lt;/P&gt;&lt;P&gt;access-list capout permit tcp host xxxx host 76.185.77.99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capin interface inside&lt;/P&gt;&lt;P&gt;capture capout access-list capout interface outside&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provide the following outputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show capture capin&lt;/P&gt;&lt;P&gt;show capture capout&lt;/P&gt;&lt;P&gt;show capture asp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 00:36:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828495#M492372</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-29T00:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828496#M492373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio, this traffic is not being sourced from a VPN tunnel. It is regular traffic traversing the internet. There are some other IP addresses provided by my ISP. I could try another if you think the one I'm using is defective. I do not have the luxury of a different public network however.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied your suggested changes (making sure to replace the XXX's with the ISP provided public outside address and here are the results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show capture capin"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet captured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet shown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show capture capout"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet captured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;0 packet shown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result of the command: "show capture asp"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;413 packets captured&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; 1: 18:47:26.728798 9afd.43ad.b4c9 1503.0100.1630 0x80e9 27:&amp;nbsp; Drop-reason: (np-socket-closed) Dropped pending packets in a closed socket&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; 2: 18:47:26.729469 802.1Q vlan#1 P0 192.168.23.5.4438 &amp;gt; 192.168.23.3.443: F 2125777054:2125777054(0) ack 2832524426 win 64836 Drop-reason: (tcp-not-syn) First TCP packet not SYN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;etcetera, etcetera&amp;nbsp; &lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; 72: 18:49:25.494954 802.1Q vlan#1 P0 192.168.23.5.137 &amp;gt; 192.168.23.255.137:&amp;nbsp; udp 50 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; 73: 18:49:26.244677 802.1Q vlan#1 P0 192.168.23.5.137 &amp;gt; 192.168.23.255.137:&amp;nbsp; udp 50 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 01:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828496#M492373</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-29T01:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828497#M492374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see on the capture: capin and capout there are no packets, that means the rdp requests are not getting into your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is the problem, there is something outhere blocking those packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 01:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828497#M492374</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-29T01:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828498#M492375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That something out there blocking the packets happens to be the ASA5505! I can ping the outside address&amp;nbsp; of the ASA as well as connect to it using the Cisco VPN and SSL client&amp;nbsp; but 3389 wont pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed the outside address of the ASA to each of&amp;nbsp; the other available addresses in the range provided by my ISP with the&amp;nbsp; same negative result. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured a Checkpoint router to forward tcp 3389&amp;nbsp; with the outside address that had been originally assigned to the ASA&amp;nbsp; and it successfully forwards the service and continues to do so when&amp;nbsp; configured with any of the other public addresses provided by my ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the configuration file is correct then something is wrong with either the ASA5505 or the ASA software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 03:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828498#M492375</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-29T03:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828499#M492376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You got to focus on this, you are saying the ASA is the one dropping the packets but on the packet we could saw there are no packets going to the outside interface on port 3389. so witch packets are being dropped by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see my point???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 17:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828499#M492376</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-29T17:02:46Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828500#M492377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is exactly what I am saying: The ASA5505 is dropping the packets going to outside interface on port 3389. When I connect a Checkpoint, or DLink, or Juniper, or Netgear or Sonicwall router configured to forward port 3389 I have success. When I connect the ASA5505 I have failure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So yes, only the ASA5505 and no other brand of router of mine is dropping the packets going to the outside interface on port 3389.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do I need to do to make this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 18:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828500#M492377</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-29T18:00:30Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828501#M492378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you do not understand my point, how is the ASA going to drop this packets if those packets are not arriving to the outside interface, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASA were dropping the packets we should be able to see the&amp;nbsp; packets on the outside interface but none on the inside interface, and this is not the case, we are not seeing packets on any of the ASA interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do a show capture asp | include xx.xx.xx (xx.xx.xx. is the source ip address of the connection)&lt;/P&gt;&lt;P&gt;This is going to show us the packets being dropped by the asa regarding that particular IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you attached the updated and complete configuration file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 18:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828501#M492378</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-29T18:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828502#M492379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your patience Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the updated running config and the results of my capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show capture asp | include 76.185.77.99&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 54: 13:14:06.303542 802.1Q vlan#2 P0 76.185.77.99.2274 &amp;gt;&amp;nbsp; 69.15.25.70.3389: S 3941159061:3941159061(0) win 8192 &lt;MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 55: 13:14:09.277909 802.1Q&amp;nbsp; vlan#2 P0 76.185.77.99.2274 &amp;gt; 69.15.25.70.3389: S&amp;nbsp; 3941159061:3941159061(0) win 8192 &lt;MSS 1260=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 56: 13:14:15.261400 802.1Q vlan#2 P0&amp;nbsp; 76.185.77.99.2274 &amp;gt; 69.15.25.70.3389: S 3941159061:3941159061(0) win&amp;nbsp; 8192 &lt;MSS 1260=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt; 332: 13:20:58.395334 802.1Q&amp;nbsp; vlan#2 P0 76.185.77.99.1276 &amp;gt; 69.15.25.70.3389: S&amp;nbsp; 2667809503:2667809503(0) win 8192 &lt;MSS 1260=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt; 334: 13:21:01.387553 802.1Q vlan#2 P0&amp;nbsp; 76.185.77.99.1276 &amp;gt; 69.15.25.70.3389: S 2667809503:2667809503(0) win&amp;nbsp; 8192 &lt;MSS 1260=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt; 335:&amp;nbsp; 13:21:07.377711 802.1Q vlan#2 P0 76.185.77.99.1276 &amp;gt;&amp;nbsp; 69.15.25.70.3389: S 2667809503:2667809503(0) win 8192 &lt;MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 19:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828502#M492379</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-29T19:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828503#M492380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please take out the attached filled( your configuration) this in order to provide security to your company.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration seems the one required to me, have you tried to do RDP from another PC on the outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASP drop we are able to see that the ASA is the one dropping the connections, can you enable logging and then try to make the connections and see the logs being generated by this connection.&lt;/P&gt;&lt;P&gt;Logging enable&lt;/P&gt;&lt;P&gt;logging monitor 7&lt;/P&gt;&lt;P&gt;and then show loggin | include xxxx ( Ip address of the outside interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think there is something that it is not expected or secure enough for the ASA on that particular connection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 20:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828503#M492380</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-29T20:10:35Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828504#M492381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the log report from my ISP connection and that of someone else on a different ISP connection:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp; Nov 29 2011&amp;nbsp;&amp;nbsp;&amp;nbsp; 14:44:07&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 64.46.169.26&amp;nbsp;&amp;nbsp;&amp;nbsp; 2715&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.23.18&amp;nbsp;&amp;nbsp;&amp;nbsp; 3389&amp;nbsp;&amp;nbsp;&amp;nbsp; Deny tcp src outside:64.46.169.26/2715 dst inside:192.168.23.18/3389 by access-group "outside_access_in_2" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp; Nov 29 2011&amp;nbsp;&amp;nbsp;&amp;nbsp; 14:44:01&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 76.185.77.99&amp;nbsp;&amp;nbsp;&amp;nbsp; 1845&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.23.18&amp;nbsp;&amp;nbsp;&amp;nbsp; 3389&amp;nbsp;&amp;nbsp;&amp;nbsp; Deny tcp src outside:76.185.77.99/1845 dst inside:192.168.23.18/3389 by access-group "outside_access_in_2" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 20:51:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828504#M492381</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-29T20:51:50Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828505#M492382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logs never lie, seems like the access-group is dropping the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please create the following line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in_2 line 1&amp;nbsp; permit tcp host 76.185.77.99 host 192.168.23.18 eq 3389.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this ASAP and let me know the result,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be waiting in order to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 21:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828505#M492382</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-29T21:07:25Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828506#M492383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exito! (success) Me agradesco mucho. I greatly appreciate your efforts. 5 stars for you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 21:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828506#M492383</guid>
      <dc:creator>mellison</dc:creator>
      <dc:date>2011-11-29T21:17:22Z</dc:date>
    </item>
    <item>
      <title>ASA5505 8.4.2 nat (outside,inside) black hole</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828507#M492384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear that now everything is working, finally we got into the bottom of the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you have a good one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 21:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-8-4-2-nat-outside-inside-black-hole/m-p/1828507#M492384</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-29T21:21:05Z</dc:date>
    </item>
  </channel>
</rss>

