<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot get packets from NAT'ed int to Internet! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799502#M531941</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update: I returned to work the next day and added ICMP to the inpect policy. No ICMP packets returned. I did find something interesting- in a test to a server my buddy hosts, I attempted several RDP connections, and asked him to check his logs. &lt;STRONG&gt;HE SAW THE CONNECTION REQUESTS HIT HIS SERVER! &lt;/STRONG&gt;Also, after learning about packet-trace, I saw that ICMP creates a flow, gets past the ACL's and picks up the global address, so &lt;STRONG&gt;ICMP IS GETTING OUT&lt;/STRONG&gt;. I made a lame attempt at packet capture. I could see the return packets return to the outside interface but no egress match- weird. For that, I believe I had just set up the capture incorrectly. But odd that the packets were hitting the outside interface on the return.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before I left for the day, I had stripped the IP set up for the management interface, as it was only syncing at half duplex and 100 Mb/s. I returned to the original sub-interface set up I had. AND, I tested that I was seeing the same condition with this set up- packets outbound good but no return packets to my host. How can I see where exactly the packet is dropped in the firewall or if it's getting that far (maybe the router in front of the ASA is blocking it)? New config attached...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===================================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;svc-ASA# sho config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 13:29:35.636 EDT Thu Sep 1 2011&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname svc-ASA&lt;/P&gt;&lt;P&gt;domain-name dns.domain.com&lt;/P&gt;&lt;P&gt;enable password yB8aikWYtWXF7HR/ encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 69.147.114.210 &lt;/P&gt;&lt;P&gt;&lt;A href="http://www.yahoo.com"&gt;www.yahoo.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description Ethernet to 3825 router (internet gateway)&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.244.50 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description ADMIN servers&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif admin&lt;/P&gt;&lt;P&gt; security-level 96&lt;/P&gt;&lt;P&gt; ip address x.x.227.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.60&lt;/P&gt;&lt;P&gt; vlan 60&lt;/P&gt;&lt;P&gt; nameif VLAN60&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.31.1.10 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; description Employee access&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 10.0.0.10 255.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; description Routable IP pool&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif Admin2&lt;/P&gt;&lt;P&gt; security-level 98&lt;/P&gt;&lt;P&gt; ip address x.x.246.1 255.255.254.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex half&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asdm-623.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name dns.domain.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.9&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.10&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.221&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.108&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.29&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.215&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.223&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.224&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.8&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.112&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list employee_inbound remark New Wireless Admin permit to Wired Admin&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit object-group DM_INLINE_PROTOCOL_2 Admin_172_Network 255.255.0.0 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq ldaps&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.214&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.13&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.90&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.7&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.101&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.244.49&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.22&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.244.51&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.140&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.37&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 123&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 3689&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq 5353&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.178&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.44&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.174&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.33&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.111&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq ntp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq sip&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq sip&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 465&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.49&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.63&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.110&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.121&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq netbios-ssn&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 445&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.154&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host 10.0.2.3&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.41&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq pptp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.59&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended deny ip any host 200.23.34.33&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.217&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.56&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.156&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.66&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.30&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any host x.x.227.10 eq domain&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any host x.x.227.221 eq www&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.18&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.17&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.220&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.222&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.223&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.225&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.253&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.45&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.46&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.47&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.48&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.49&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.50&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.51&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.52&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.53&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.54&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.55&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.56&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.57&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.58&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.59&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.60&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.61&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.62&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.63&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.64&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.65&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.202&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.108&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.5&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ftp-data&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.130&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 3128&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq 3128&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.8&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.169&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.20&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.215&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.29&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 5900&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 5800&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq pcanywhere-data&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.195&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 2048&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.112&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 1688&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.110&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.167&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.193&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.188&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.83&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.89&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.95&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.153&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.200&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny tcp any any eq 7171&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.138&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 195.225.204.227 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 195.225.205.97 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 195.13.58.57 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 193.13.58.57 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 93.182.130.12 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 135&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ldaps&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.98&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ldap&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.214&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.13&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.197&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.90&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 9101&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.244.49&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.22&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.244.51&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.140&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.221&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.37&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 123&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 3689&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq 5353&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.178&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.44&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.174&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.33&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit object-group DM_INLINE_PROTOCOL_3 any host x.x.246.111&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq ntp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq sip&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq sip&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 465&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.63&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.110&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.121&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq netbios-ssn&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 445&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.226.154&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host 10.0.2.3&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.41&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.59&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip any host 200.23.34.33&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.217&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.156&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.66&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.30&lt;/P&gt;&lt;P&gt;access-list cap extended permit ip x.x.0.0 255.255.0.0 host x.x.227.18&lt;/P&gt;&lt;P&gt;access-list cap extended permit ip host x.x.227.18 x.x.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat-employee extended permit ip 10.0.0.0 255.0.0.0 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat-employee extended permit ip x.x.246.0 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list check-ftp extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list check-ftp extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list check-ftp remark Permit from Wired Admin to Wireless Admin&lt;/P&gt;&lt;P&gt;access-list check-ftp extended permit object-group DM_INLINE_PROTOCOL_1 x.x.227.0 255.255.255.0 Admin_172_Network 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list employee-inbound extended permit tcp any any eq 135&lt;/P&gt;&lt;P&gt;access-list nonat-management extended permit ip 172.31.0.0 255.255.0.0 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat-management extended permit ip x.x.246.0 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list VLAN60_access extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list testcap extended permit ip host &lt;TESTSERVER_IP_ON_NET&gt; host x.x.246.200&lt;/TESTSERVER_IP_ON_NET&gt;&lt;/P&gt;&lt;P&gt;access-list testcap_ingress extended permit ip any host &lt;TESTSERVER_IP_ON_NET&gt;&lt;/TESTSERVER_IP_ON_NET&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable...&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.246.200&lt;/P&gt;&lt;P&gt;nat (admin) 2 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (admin) 3 x.x.246.0 255.255.254.0&lt;/P&gt;&lt;P&gt;nat (admin) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Admin2) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (Admin2) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (VLAN60) 0 access-list nonat-management&lt;/P&gt;&lt;P&gt;nat (VLAN60) 1 172.31.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (admin,outside) x.x.227.0 x.x.227.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.10 x.x.227.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.9 x.x.227.9 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.221 x.x.227.221 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.17 x.x.227.17 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.55 x.x.227.55 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.11 x.x.227.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.134 x.x.227.134 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.160 x.x.227.160 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.169 x.x.227.169 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.148 x.x.227.148 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.40 x.x.227.40 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.91 x.x.227.91 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.19 x.x.227.19 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.220 x.x.227.220 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.222 x.x.227.222 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.223 x.x.227.223 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.225 x.x.227.225 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.253 x.x.227.253 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.45 x.x.227.45 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.46 x.x.227.46 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.47 x.x.227.47 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.48 x.x.227.48 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.49 x.x.227.49 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.50 x.x.227.50 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.51 x.x.227.51 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.52 x.x.227.52 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.53 x.x.227.53 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.54 x.x.227.54 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.56 x.x.227.56 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.57 x.x.227.57 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.58 x.x.227.58 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.59 x.x.227.59 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.60 x.x.227.60 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.61 x.x.227.61 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.62 x.x.227.62 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.63 x.x.227.63 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.64 x.x.227.64 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.65 x.x.227.65 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.12 x.x.227.12 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.13 x.x.227.13 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.8 x.x.227.8 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.130 x.x.227.130 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.29 x.x.227.29 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.215 x.x.227.215 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.224 x.x.227.224 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.112 x.x.246.112 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.195 x.x.227.195 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.153 x.x.227.153 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.214 x.x.227.214 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.7 x.x.227.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.179 x.x.227.179 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) 10.0.2.2 10.0.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.98 x.x.227.98 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.140 x.x.227.140 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.214 x.x.246.214 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.90 x.x.227.90 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.101 x.x.227.101 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.244.49 x.x.244.49 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.22 x.x.227.22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.244.51 x.x.244.51 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.37 x.x.227.37 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.178 x.x.227.178 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.224.111 x.x.226.111 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.44 x.x.246.44 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.174 x.x.227.174 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.33 x.x.246.33 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.111 x.x.246.111 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.121 x.x.227.121 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.154 x.x.227.154 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.41 x.x.227.41 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.59 x.x.246.59 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.217 x.x.227.217 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.156 x.x.227.156 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.66 x.x.246.66 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.30 x.x.227.30 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group check-ftp in interface admin&lt;/P&gt;&lt;P&gt;access-group employee_inbound in interface inside&lt;/P&gt;&lt;P&gt;access-group VLAN60_access in interface VLAN60&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.244.51 1&lt;/P&gt;&lt;P&gt;bunch of stuff about telnet, http, blah blah...&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map csc&lt;/P&gt;&lt;P&gt; match access-list csc&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ils&lt;/P&gt;&lt;P&gt; class csc&lt;/P&gt;&lt;P&gt;&amp;nbsp; csc fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:7072c6d2d3de5da86a940965d975df79&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Sep 2011 10:50:31 GMT</pubDate>
    <dc:creator>gregdzurinda</dc:creator>
    <dc:date>2011-09-15T10:50:31Z</dc:date>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799492#M531925</link>
      <description>&lt;P&gt;I have an ASA firewall (IOS 8.2) on which I am trying to configure an additional NAT'ed interface off the management port. Frowned upon, I know, but I have removed the management-only option, and I know this can and has worked in other environments &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface management 0/0 ("VLAN60") is the interface through which I am trying to move traffic out the "outside" interface and to the Internet. It can ping the servers behind the "Admin" interface (those are support servers- DNS, etc.).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface "inside" is working, and it is how employees access the Internet now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I expected interface "VLAN60" to work the same way as "inside." Why is this not the case?! (Banging my head against the wall...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping an outside IP address, I see my IP (172.31.0.1) in the xlate table, AND I see this in the log:&lt;/P&gt;&lt;P&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 66.161.x.x/0 gaddr x.x.246.200/26927 laddr 172.31.0.1/1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config attached...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799492#M531925</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2019-03-11T21:19:56Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799493#M531927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config looks perfect as advised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to add the following icmp inspection if you test with ping:&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to test with any other application? maybe telnet, http, ftp from VLAN60 interface outbound to the Internet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 00:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799493#M531927</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-02T00:05:57Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799494#M531929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I should add that- that will be a start. However, why is it that 10.0.0.0 on interface "inside" is able to ping and get replies from outside? I thought there must be something I am missing/stepping on in the NAT config or that the access-lists aren't applied properly. I had suspected that ICMP was getting out but the reply packets were not returning. Are you sure everything looks good with NAT? Seems pretty straight forward to me- I just tried to mimic how translation was being done for the 10.0.0.0 network with necessary adjustments of course.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 00:28:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799494#M531929</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-09-02T00:28:38Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799495#M531932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the log output, it looks to be correctly NATed to "gaddr x.x.246.200", so NAT is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do have NAT exemption configured for VLAN60 and NAT exemption takes precedence over the dynamic NAT, but I don't see that the access-list matches the traffic that you are trying to send to the internet. Please double check as the full subnet was not provided so i can't check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (VLAN60) 0 access-list nonat-management&lt;/P&gt;&lt;P&gt;access-list nonat-management extended permit ip 172.31.0.0 255.255.0.0 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat-management extended permit ip x.x.246.0 255.255.254.0 any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 00:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799495#M531932</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-02T00:33:07Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799496#M531933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; and one thing I don't understand...(I am an integrator stepping in to this, so most of these configs were already in the fw when I stepped in) is these statements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.246.200&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (admin) 2 x.x.227.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (admin) 3 x.x.246.0 255.255.254.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (admin) 1 10.0.0.0 255.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (VLAN60) 0 access-list nonat-management&lt;/P&gt;&lt;P&gt;nat (VLAN60) 1 172.31.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Admin2) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (Admin2) 1 0.0.0.0 0.0.0.0&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.246.200&lt;/P&gt;&lt;P&gt;nat (admin) 2 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (admin) 3 x.x.246.0 255.255.254.0&lt;/P&gt;&lt;P&gt;nat (admin) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (VLAN60) 0 access-list nonat-management&lt;/P&gt;&lt;P&gt;nat (VLAN60) 1 172.31.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Admin2) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (Admin2) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;why is the NAT source in the above statements interface "admin"? Only the .227 is configured on the "Admin" interface. The 10.0.0.0 is assigned to "inside", and the .246 net is assigned to the "admin2" interface. I suspect the (admin) translations for the 246 and 227 subnets aren't even getting hits since the NAT ID doesn't match the global. But they are not RFC 1918 addresses, so they get through the outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 00:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799496#M531933</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-09-02T00:54:37Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799497#M531936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that seems to be misconfiguration, and even .227 that has been correctly identified on "Admin" interface will not work because the NAT identifier is "2", and there is no matching global identifier "2". So none of the NAT on the "admin" interface will work at this stage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following is clearly incorrect as you mention:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (admin) 3 x.x.246.0 255.255.254.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (admin) 1 10.0.0.0 255.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (admin) 2 x.x.227.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;needs to be changed to:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (admin) 1 x.x.227.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 01:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799497#M531936</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-02T01:06:20Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799498#M531937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I definitely double-checked that one Jennifer. Thanks for your replies by the way. The exemption definitely does not include the scope or traffic I do want NAT'ed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 01:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799498#M531937</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-09-02T01:27:39Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799499#M531938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great, thanks for the update.&lt;/P&gt;&lt;P&gt;Is ping working now from VLAN60?&lt;/P&gt;&lt;P&gt;Try to ping the outside interface next hop and see if that replies.&lt;/P&gt;&lt;P&gt;Otherwise, run a packet capture on the outside interface and see if the ASA is getting a reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 01:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799499#M531938</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-02T01:37:10Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799500#M531939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I did forget to mention that the 227 and 246.0/23 are routable IP's. That's why I was thinking those configs aren't doing anything. I can probably cut these 3 statements out:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (admin) 2 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (admin) 3 x.x.246.0 255.255.254.0&lt;/P&gt;&lt;P&gt;nat (admin) 1 10.0.0.0 255.0.0.0 #### redundant since another entry matching global NAT ID a few lines down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still, those don't have any bearing on why 172.31. has no access to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to add ICMP inspect for sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I may need to step through the access-lists and add a permit ip any any to the interface "VLAN60" - but which direction?- out? and I being that the security-level of this "VLAN60" interface is 100, I should be able to RDP with no issues, correct? x.x.227.0 servers can RDP to outside servers with no problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 01:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799500#M531939</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-09-02T01:41:14Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799501#M531940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sadly, I have to wait until tomorrow morning to add ICMP to the inspect policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 01:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799501#M531940</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-09-02T01:42:38Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799502#M531941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update: I returned to work the next day and added ICMP to the inpect policy. No ICMP packets returned. I did find something interesting- in a test to a server my buddy hosts, I attempted several RDP connections, and asked him to check his logs. &lt;STRONG&gt;HE SAW THE CONNECTION REQUESTS HIT HIS SERVER! &lt;/STRONG&gt;Also, after learning about packet-trace, I saw that ICMP creates a flow, gets past the ACL's and picks up the global address, so &lt;STRONG&gt;ICMP IS GETTING OUT&lt;/STRONG&gt;. I made a lame attempt at packet capture. I could see the return packets return to the outside interface but no egress match- weird. For that, I believe I had just set up the capture incorrectly. But odd that the packets were hitting the outside interface on the return.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before I left for the day, I had stripped the IP set up for the management interface, as it was only syncing at half duplex and 100 Mb/s. I returned to the original sub-interface set up I had. AND, I tested that I was seeing the same condition with this set up- packets outbound good but no return packets to my host. How can I see where exactly the packet is dropped in the firewall or if it's getting that far (maybe the router in front of the ASA is blocking it)? New config attached...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===================================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;svc-ASA# sho config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 13:29:35.636 EDT Thu Sep 1 2011&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname svc-ASA&lt;/P&gt;&lt;P&gt;domain-name dns.domain.com&lt;/P&gt;&lt;P&gt;enable password yB8aikWYtWXF7HR/ encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 69.147.114.210 &lt;/P&gt;&lt;P&gt;&lt;A href="http://www.yahoo.com"&gt;www.yahoo.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description Ethernet to 3825 router (internet gateway)&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.244.50 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description ADMIN servers&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif admin&lt;/P&gt;&lt;P&gt; security-level 96&lt;/P&gt;&lt;P&gt; ip address x.x.227.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.60&lt;/P&gt;&lt;P&gt; vlan 60&lt;/P&gt;&lt;P&gt; nameif VLAN60&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.31.1.10 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; description Employee access&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 10.0.0.10 255.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; description Routable IP pool&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif Admin2&lt;/P&gt;&lt;P&gt; security-level 98&lt;/P&gt;&lt;P&gt; ip address x.x.246.1 255.255.254.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex half&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asdm-623.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name dns.domain.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.9&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.10&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.221&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.108&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.29&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.215&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.223&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.224&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.8&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.112&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list employee_inbound remark New Wireless Admin permit to Wired Admin&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit object-group DM_INLINE_PROTOCOL_2 Admin_172_Network 255.255.0.0 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq ldaps&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.214&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.13&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.90&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.7&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.101&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.244.49&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.22&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.244.51&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.140&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.37&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 123&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 3689&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq 5353&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.178&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.44&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.174&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.33&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.111&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq ntp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq sip&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit udp any any eq sip&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 465&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.49&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.63&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.110&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.121&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq netbios-ssn&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq 445&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.154&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host 10.0.2.3&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.41&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit tcp any any eq pptp&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.59&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended deny ip any host 200.23.34.33&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.217&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.56&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.156&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.246.66&lt;/P&gt;&lt;P&gt;access-list employee_inbound extended permit ip any host x.x.227.30&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any host x.x.227.10 eq domain&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any host x.x.227.221 eq www&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.18&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.17&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.220&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.222&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.223&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.225&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.253&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.45&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.46&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.47&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.48&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.49&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.50&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.51&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.52&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.53&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.54&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.55&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.56&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.57&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.58&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.59&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.60&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.61&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.62&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.63&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.64&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.65&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.202&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.108&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.5&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ftp-data&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.130&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 3128&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq 3128&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.8&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.169&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.20&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.215&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.29&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 5900&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 5800&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq pcanywhere-data&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.195&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 2048&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.112&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 1688&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.110&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.167&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.193&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.188&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.83&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.89&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.95&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.153&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.200&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny tcp any any eq 7171&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.138&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 195.225.204.227 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 195.225.205.97 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 195.13.58.57 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 193.13.58.57 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip host 93.182.130.12 any&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 135&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ldaps&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.98&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ldap&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.214&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.13&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.197&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.90&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 9101&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.244.49&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.22&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.244.51&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.140&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.221&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.37&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 123&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 3689&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq 5353&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.178&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.44&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.174&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.33&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit object-group DM_INLINE_PROTOCOL_3 any host x.x.246.111&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq ntp&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq sip&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit udp any any eq sip&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 465&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.63&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.110&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.121&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq netbios-ssn&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit tcp any any eq 445&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.226.154&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host 10.0.2.3&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.41&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.59&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended deny ip any host 200.23.34.33&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.217&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.156&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.246.66&lt;/P&gt;&lt;P&gt;access-list outside_inbound extended permit ip any host x.x.227.30&lt;/P&gt;&lt;P&gt;access-list cap extended permit ip x.x.0.0 255.255.0.0 host x.x.227.18&lt;/P&gt;&lt;P&gt;access-list cap extended permit ip host x.x.227.18 x.x.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat-employee extended permit ip 10.0.0.0 255.0.0.0 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat-employee extended permit ip x.x.246.0 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list check-ftp extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list check-ftp extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list check-ftp remark Permit from Wired Admin to Wireless Admin&lt;/P&gt;&lt;P&gt;access-list check-ftp extended permit object-group DM_INLINE_PROTOCOL_1 x.x.227.0 255.255.255.0 Admin_172_Network 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list employee-inbound extended permit tcp any any eq 135&lt;/P&gt;&lt;P&gt;access-list nonat-management extended permit ip 172.31.0.0 255.255.0.0 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat-management extended permit ip x.x.246.0 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list VLAN60_access extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list testcap extended permit ip host &lt;TESTSERVER_IP_ON_NET&gt; host x.x.246.200&lt;/TESTSERVER_IP_ON_NET&gt;&lt;/P&gt;&lt;P&gt;access-list testcap_ingress extended permit ip any host &lt;TESTSERVER_IP_ON_NET&gt;&lt;/TESTSERVER_IP_ON_NET&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable...&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.246.200&lt;/P&gt;&lt;P&gt;nat (admin) 2 x.x.227.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (admin) 3 x.x.246.0 255.255.254.0&lt;/P&gt;&lt;P&gt;nat (admin) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Admin2) 0 access-list nonat-employee&lt;/P&gt;&lt;P&gt;nat (Admin2) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (VLAN60) 0 access-list nonat-management&lt;/P&gt;&lt;P&gt;nat (VLAN60) 1 172.31.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (admin,outside) x.x.227.0 x.x.227.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.10 x.x.227.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.9 x.x.227.9 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.221 x.x.227.221 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.17 x.x.227.17 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.55 x.x.227.55 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.11 x.x.227.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.134 x.x.227.134 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.160 x.x.227.160 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.169 x.x.227.169 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.148 x.x.227.148 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.40 x.x.227.40 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.91 x.x.227.91 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.19 x.x.227.19 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.220 x.x.227.220 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.222 x.x.227.222 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.223 x.x.227.223 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.225 x.x.227.225 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.253 x.x.227.253 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.45 x.x.227.45 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.46 x.x.227.46 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.47 x.x.227.47 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.48 x.x.227.48 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.49 x.x.227.49 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.50 x.x.227.50 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.51 x.x.227.51 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.52 x.x.227.52 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.53 x.x.227.53 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.54 x.x.227.54 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.56 x.x.227.56 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.57 x.x.227.57 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.58 x.x.227.58 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.59 x.x.227.59 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.60 x.x.227.60 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.61 x.x.227.61 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.62 x.x.227.62 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.63 x.x.227.63 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.64 x.x.227.64 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.65 x.x.227.65 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.12 x.x.227.12 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.13 x.x.227.13 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.8 x.x.227.8 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.130 x.x.227.130 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.29 x.x.227.29 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.215 x.x.227.215 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.224 x.x.227.224 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.112 x.x.246.112 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.195 x.x.227.195 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.153 x.x.227.153 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.214 x.x.227.214 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.7 x.x.227.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.179 x.x.227.179 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) 10.0.2.2 10.0.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.98 x.x.227.98 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.140 x.x.227.140 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.214 x.x.246.214 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.90 x.x.227.90 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.101 x.x.227.101 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.244.49 x.x.244.49 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.22 x.x.227.22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.244.51 x.x.244.51 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.37 x.x.227.37 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.178 x.x.227.178 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.224.111 x.x.226.111 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.44 x.x.246.44 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.174 x.x.227.174 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.33 x.x.246.33 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.111 x.x.246.111 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.121 x.x.227.121 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.154 x.x.227.154 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.41 x.x.227.41 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.59 x.x.246.59 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.217 x.x.227.217 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.156 x.x.227.156 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.246.66 x.x.246.66 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (admin,inside) x.x.227.30 x.x.227.30 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group check-ftp in interface admin&lt;/P&gt;&lt;P&gt;access-group employee_inbound in interface inside&lt;/P&gt;&lt;P&gt;access-group VLAN60_access in interface VLAN60&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.244.51 1&lt;/P&gt;&lt;P&gt;bunch of stuff about telnet, http, blah blah...&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map csc&lt;/P&gt;&lt;P&gt; match access-list csc&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ils&lt;/P&gt;&lt;P&gt; class csc&lt;/P&gt;&lt;P&gt;&amp;nbsp; csc fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:7072c6d2d3de5da86a940965d975df79&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2011 10:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799502#M531941</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-09-15T10:50:31Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799503#M531942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the ASA g0/1 connected to? I assume it is a trunk port and vlan 60 is allowed through the trunk port? Also what is the native vlan configured on the switch for that trunk port?&lt;/P&gt;&lt;P&gt;It is also not recommended to mix physical and subinterface settings on 1 interface as configured.&lt;/P&gt;&lt;P&gt;I would suggest that you move the current physical interface settings on g0/1, to a subinterface and leave the physical interface settings unconfigured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, your last config doesn't seem to have "inspect icmp" enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2011 22:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799503#M531942</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-15T22:22:42Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799504#M531943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry about that- somehow I missed that line in the "scrubbing." It is in the configs though- I verified it. It is most certainly a trunk port to which the firewall is conected (Cisco 4507), but I don't recall if the native VLAN is 60.&lt;/P&gt;&lt;P&gt;I know about that physical and sub-interface best practice. I have been told though, that this can be done. Also, you may remember, I was working at getting the mgmt interface up for this, and never could make it happen. Seems to be a common theme- something I am missing in the configs to allow the return packets on any int I try to get up! &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2011 00:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799504#M531943</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-09-16T00:37:02Z</dc:date>
    </item>
    <item>
      <title>Cannot get packets from NAT'ed int to Internet!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799505#M531944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please share the output of packet tracer that you perform. That would give an indication if ASA is dropping anything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2011 00:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-get-packets-from-nat-ed-int-to-internet/m-p/1799505#M531944</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-16T00:43:50Z</dc:date>
    </item>
  </channel>
</rss>

