<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 8.42 nat problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821063#M492489</link>
    <description>&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring an asa 5505 with 8.42 software.&lt;/P&gt;&lt;P&gt;I need to access an https server on the inside via the outside interface.&lt;/P&gt;&lt;P&gt;I have moved the http server enable to port 10443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried to make a "network object nat rule"&lt;/P&gt;&lt;P&gt;Have even checked the video &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant get access.&lt;/P&gt;&lt;P&gt;Packet tracer points to the nat rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Vejrstation&lt;/P&gt;&lt;P&gt;host 192.168.4.15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Vejrstation&lt;/P&gt;&lt;P&gt;nat (any,outside) static interface service tcp https https&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;object network Vejrstation&lt;BR /&gt;nat (any,outside) static interface service tcp https https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where do i do wrong ?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:55:09 GMT</pubDate>
    <dc:creator>pbuch</dc:creator>
    <dc:date>2019-03-11T21:55:09Z</dc:date>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821063#M492489</link>
      <description>&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring an asa 5505 with 8.42 software.&lt;/P&gt;&lt;P&gt;I need to access an https server on the inside via the outside interface.&lt;/P&gt;&lt;P&gt;I have moved the http server enable to port 10443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried to make a "network object nat rule"&lt;/P&gt;&lt;P&gt;Have even checked the video &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant get access.&lt;/P&gt;&lt;P&gt;Packet tracer points to the nat rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Vejrstation&lt;/P&gt;&lt;P&gt;host 192.168.4.15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Vejrstation&lt;/P&gt;&lt;P&gt;nat (any,outside) static interface service tcp https https&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;object network Vejrstation&lt;BR /&gt;nat (any,outside) static interface service tcp https https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where do i do wrong ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821063#M492489</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2019-03-11T21:55:09Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821064#M492490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The log says&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Nov 25 2011&lt;/TD&gt;&lt;TD&gt;06:03:49&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;188.177.226.89&lt;/TD&gt;&lt;TD&gt;3436&lt;/TD&gt;&lt;TD&gt;83.89.223.42&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;TCP access denied by ACL from 188.177.226.89/3436 to outside:83.89.223.42/443&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object https any object Vejrstation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but why ?&lt;/P&gt;&lt;P&gt;No hits on the accesslist&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 13:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821064#M492490</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T13:22:53Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821065#M492491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; nat (inside,outside)&amp;nbsp; use this as you said server is in inside zone .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 13:31:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821065#M492491</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-25T13:31:55Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821066#M492492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hve tried that, same result exept that the tracer says ok&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 13:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821066#M492492</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T13:34:29Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821067#M492493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; change you outside ACL as well since packet is not directly coming for 192.168.4.15.&lt;/P&gt;&lt;P&gt;You should allow acl for public IP which is going to be mapped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 13:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821067#M492493</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-25T13:37:04Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821068#M492494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Not according to the video.... but i have tried that&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:02:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821068#M492494</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T14:02:55Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821069#M492495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Post you full config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821069#M492495</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-25T14:07:38Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821070#M492498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thses shpould be your configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Vejrstation&lt;/P&gt;&lt;P&gt;host 192.168.4.15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service tcp_https&lt;/P&gt;&lt;P&gt;&amp;nbsp; service tcp destination eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface Vejrstation service tcp_https tcp_https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit any object Vejrstation eq 443&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should do, if not then you would need to check which party is not responding by using captures. Also can you post the output of packet-tracer???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821070#M492498</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-25T14:10:58Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821071#M492499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2) &lt;BR /&gt;!&lt;BR /&gt;hostname xxxxxxxxxx&lt;BR /&gt;enable password EnFClNY/JeYR4dhI encrypted&lt;BR /&gt;passwd EnFClNY/JeYR4dhI encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.4.6 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 83.89.223.42 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa842-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-192.168.1.0&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.8.0-6&lt;BR /&gt; subnet 192.168.8.0 255.255.255.248&lt;BR /&gt;object network obj-192.168.18.0&lt;BR /&gt; subnet 192.168.18.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.4.0&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.15.0&lt;BR /&gt; subnet 192.168.15.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.251.0&lt;BR /&gt; subnet 192.168.251.0 255.255.255.0&lt;BR /&gt;object service https&lt;BR /&gt; service tcp destination eq https &lt;BR /&gt;object service 4001&lt;BR /&gt; service tcp destination eq 4001 &lt;BR /&gt;object network Vejrstation&lt;BR /&gt; host 192.168.4.15&lt;BR /&gt;access-list 200 extended permit ip 192.168.4.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list 200 extended permit ip 192.168.4.0 255.255.255.0 192.168.8.0 255.255.255.248 &lt;BR /&gt;access-list 200 extended permit ip 192.168.4.0 255.255.255.0 192.168.18.0 255.255.255.0 &lt;BR /&gt;access-list 200 extended permit ip 192.168.4.0 255.255.255.0 192.168.15.0 255.255.255.0 &lt;BR /&gt;access-list 200 extended permit ip 192.168.4.0 255.255.255.0 192.168.251.0 255.255.255.0 &lt;BR /&gt;access-list Split_Tunnel_List standard permit 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object Vejrstation eq https &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered warnings&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool vpnklient 192.168.4.51-192.168.4.55&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,any) source static obj-192.168.4.0 obj-192.168.4.0 destination static obj-192.168.4.0 obj-192.168.4.0 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-192.168.4.0 obj-192.168.4.0 destination static obj-192.168.8.0-6 obj-192.168.8.0-6 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-192.168.4.0 obj-192.168.4.0 destination static obj-192.168.1.0 obj-192.168.1.0 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-192.168.4.0 obj-192.168.4.0 destination static obj-192.168.18.0 obj-192.168.18.0 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-192.168.4.0 obj-192.168.4.0 destination static obj-192.168.15.0 obj-192.168.15.0 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-192.168.4.0 obj-192.168.4.0 destination static obj-192.168.251.0 obj-192.168.251.0 no-proxy-arp&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network Vejrstation&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 83.89.223.41 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable 10443&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.4.0 255.255.255.0 inside&lt;BR /&gt;http 188.177.226.88 255.255.255.248 outside&lt;BR /&gt;http 188.120.69.106 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec ikev1 transform-set vpnswarcolan esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set vpnklientswarco esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto dynamic-map vpnklientswarco 10 set ikev1 transform-set vpnklientswarco&lt;BR /&gt;crypto map partnermap 200 match address 200&lt;BR /&gt;crypto map partnermap 200 set pfs group1&lt;BR /&gt;crypto map partnermap 200 set peer 93.162.119.26 89.88.87.89 &lt;BR /&gt;crypto map partnermap 200 set ikev1 transform-set vpnswarcolan&lt;BR /&gt;crypto map partnermap 65535 ipsec-isakmp dynamic vpnklientswarco&lt;BR /&gt;crypto map partnermap interface outside&lt;BR /&gt;crypto isakmp identity address &lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash md5&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 28800&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 28800&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash md5&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 192.168.4.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 87.48.245.198 255.255.255.255 outside&lt;BR /&gt;ssh 188.120.69.106 255.255.255.255 outside&lt;BR /&gt;ssh 188.177.226.88 255.255.255.248 outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 194.239.134.83 193.162.153.164&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.4.190-192.168.4.220 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy vpnklientswarco internal&lt;BR /&gt;group-policy vpnklientswarco attributes&lt;BR /&gt; dns-server value 194.239.134.83 193.162.153.164&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel_List&lt;BR /&gt;username swarco password .FRI9vfYdLduSJia encrypted privilege 15&lt;BR /&gt;username jep-it password 1aqZEKKMU1dntc85 encrypted privilege 15&lt;BR /&gt;tunnel-group 93.162.119.26 type ipsec-l2l&lt;BR /&gt;tunnel-group 93.162.119.26 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group vpnklientswarco type remote-access&lt;BR /&gt;tunnel-group vpnklientswarco general-attributes&lt;BR /&gt; address-pool vpnklient&lt;BR /&gt; default-group-policy vpnklientswarco&lt;BR /&gt;tunnel-group vpnklientswarco ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 89.88.87.89 type ipsec-l2l&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:dec4c88475f8dd4ceeaebc23b2f4cf94&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821071#M492499</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T14:11:11Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821072#M492500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/3/3/67339-Packettrace.png" class="jive-image" /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821072#M492500</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T14:16:39Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821073#M492501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wondering why it should be nat (outside,inside) as you suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isnt he is trying to map internal ip with interface IP of outside interface for redirection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can only see one thing here that the access is blocked from outside .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also capture should be there sourced from outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821073#M492501</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-25T14:25:12Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821074#M492502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Capture was sourced from autside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821074#M492502</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T14:29:58Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821075#M492503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/4/3/67340-Packettrace.png" class="jive-image" /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:31:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821075#M492503</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T14:31:30Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821076#M492504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Do not put private IP that wont work .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please edit your outside ACL to allow source any destination 83.89.223.42 eq 443&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821076#M492504</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-25T14:33:25Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821077#M492505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.3 nat is all flow based nat, the one that was used earlier is called auto nat and the one I used i manual nat. My nat statement means, any source coming from outside, should be translated to itself, if it is hitting the outside interface on port 443 and that shoudl be translted to the internal ip. It's still the same thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 23456 &lt;INTERFACE ip=""&gt; 443 detailed.&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and please paste that here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821077#M492505</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-25T14:35:01Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821078#M492506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;He has done it correct, in 8.3, you don't use public ip of the , instead you use the private ip, because order of operation has changed, first the packet is un-natted and then the access-list is hit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821078#M492506</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-25T14:37:27Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821079#M492509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Varun.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another question comes here as he has shown log any packet comes for public IP (interface) on port 443 is getting denied.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821079#M492509</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-11-25T14:42:24Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821080#M492511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 23456 83.89.223.42 443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; $ tcp 4.2.2.2 23456 83.89.223.42 443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; detailed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input outside tcp 4.2.2.2 23456 83.89.223.42 44$&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Vejrstation&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 83.89.223.42/443 to 192.168.4.15/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Vejrstation eq http&lt;BR /&gt;s &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb395078, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=8, user_data=0xc94ddbd0, cs_id=0x0, use_real_addr, flags=0x0, proto&lt;BR /&gt;col=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=192.168.4.15, mask=255.255.255.255, port=443, dscp=0x0&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb36e208, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=200, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb332e68, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt; hits=170, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb3478d8, priority=0, domain=host-limit, deny=false&lt;BR /&gt; hits=23, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Vejrstation&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xcbebe160, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt; hits=8, user_data=0xcbebe4d0, cs_id=0x0, use_real_addr, flags=0x0, proto&lt;BR /&gt;col=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=192.168.4.15, mask=255.255.255.255, port=443, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb343f80, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=35, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 215, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 14:44:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821080#M492511</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T14:44:19Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821081#M492513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Seems like i have traffic throgh now.&lt;/P&gt;&lt;P&gt;Don't really kbow why &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 15:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821081#M492513</guid>
      <dc:creator>pbuch</dc:creator>
      <dc:date>2011-11-25T15:14:54Z</dc:date>
    </item>
    <item>
      <title>ASA 8.42 nat problems</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821082#M492514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet-tracer shows everything is fine, is it still not working??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 15:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-42-nat-problems/m-p/1821082#M492514</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-25T15:17:02Z</dc:date>
    </item>
  </channel>
</rss>

