<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Publish a server on an ASA, the server is at a remote location. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734413#M534386</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; OK.&amp;nbsp; I can add that setting, but how do I configure it to redirect?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Aug 2011 19:14:49 GMT</pubDate>
    <dc:creator>timothy.lewis</dc:creator>
    <dc:date>2011-08-03T19:14:49Z</dc:date>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734409#M534372</link>
      <description>&lt;P&gt;I have the following situation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are moving to another datacenter.&amp;nbsp; Our public IP address is going to change.&amp;nbsp; We have software that is dependent on a hard coded IP address (I know).&amp;nbsp; The idea is that until we are able to complete the move and update the software (for an FQDN hopefully) I need be able to have users hit the old public IP addresses at the old datacenter and have it forward to the server at the new datacenter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have two Cisco ASA 5510s at the old datacenter.&amp;nbsp; The idea was to set up a VPN tunnel between the two datacenters.&amp;nbsp; Leave the existing ACL allowing the traffic to the server intact, then change the statc NAT rule to just forward to the host on the other side of the VPN tunnel.&amp;nbsp; This did not work however.&amp;nbsp; I also set up a static route for that server to the remote VPN peer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have a pair of ISR 1841s with advanced security that are not in use at the moment.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734409#M534372</guid>
      <dc:creator>timothy.lewis</dc:creator>
      <dc:date>2019-03-11T21:07:02Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734410#M534376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Timothy &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the connection have to VPNd ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so what interface does the packet arrive on and what interface are you doing the VPN tunnel from ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 11:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734410#M534376</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T11:41:15Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734411#M534380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm not really married to the VPN.&amp;nbsp; If we can make traffic destined for site 1's ASA public IP be forwarded to site 2's ASA public IP that will work too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My initial thought was to do LAN-to-LAN VPN between the ASAs with VPN peers being the outside interface and the packet arriving on the outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 11:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734411#M534380</guid>
      <dc:creator>timothy.lewis</dc:creator>
      <dc:date>2011-08-03T11:54:28Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734412#M534384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Timothy &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be doable with our without a VPN although it does depend on your ASA code version ie. until 7.2 you could only send traffic back out of the same interface it arrived on with VPN traffic but since then the restriction has been lifted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to enable "same-security-traffic permit intra-interface" on your ASA firewall which will allow traffic to be routed back out on the same interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 12:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734412#M534384</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T12:00:46Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734413#M534386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; OK.&amp;nbsp; I can add that setting, but how do I configure it to redirect?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 19:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734413#M534386</guid>
      <dc:creator>timothy.lewis</dc:creator>
      <dc:date>2011-08-03T19:14:49Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734414#M534388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Timothy &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is default-route pointing out of the outside interface then you shouldn't neede to add a route because it will by default be routed back out of the same interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 20:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734414#M534388</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T20:34:11Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734415#M534390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Right I get that part, but it does not fit my scenario.&amp;nbsp; Let me go into the more detail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I currently have rack space at two datacenters that are not connected in any way.&amp;nbsp; At both I have ASA 5510s.&amp;nbsp; At datacenter A, my ASA has a public IP address of 1.1.1.1.&amp;nbsp; At datacenter B my ASA has a public IP address of 2.2.2.2.&amp;nbsp; Currently, my application server is at datacenter A and published on 1.1.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are moving everything to datacenter B except for one ASA until our move is complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The challenge is that the application client our customers use connects to the server on 1.1.1.1.&amp;nbsp; In the software the IP address is hard-coded, and there are thousands of these clients floating around out there and it will take weeks to get them all pointing to a new address (hopefully an FQDN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I need is for clients to try to access 1.1.1.1, from whatever their IP address is and be redirected to the server that is at a completely different location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Initially I thought I was set up a LAN to LAN VPN between the ASAs.&amp;nbsp; Then do and ACL and a static (inside,outside) 1.1.1.1 &lt;IP of="" server="" at="" remote="" datacenter=""&gt;.&amp;nbsp; That does not appear to work.&lt;/IP&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 00:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734415#M534390</guid>
      <dc:creator>timothy.lewis</dc:creator>
      <dc:date>2011-08-05T00:12:46Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734416#M534392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about if I NAT the traffic on ASA before it encrypts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NAT1 ext permit ip any 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.0.0 access-list NAT1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPN ext permit 172.16.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Aug 2011 18:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734416#M534392</guid>
      <dc:creator>timothy.lewis</dc:creator>
      <dc:date>2011-08-06T18:05:36Z</dc:date>
    </item>
    <item>
      <title>Publish a server on an ASA, the server is at a remote location.</title>
      <link>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734417#M534394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I tried this type of a set up and ran packet-tracert against it.&amp;nbsp; Here is the packet-tracert output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input WAN tcp 2.2.2.2 3389 1.1.1.1 3389 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd4cc17e0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=46650444, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;static (inside,WAN) tcp 1.1.1.1 3389 172.16.0.229 3389 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match tcp inside host 172.16.0.229 eq 3389 WAN any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1/3389&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 5&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 1.1.1.1/3389 to 172.16.0.229/3389 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group WAN-IN in interface WAN&lt;BR /&gt;access-list WAN-IN extended permit tcp any host 1.1.1.1 eq 3389 &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd8a8c6b0, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4, user_data=0xd8000b18, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=1.1.1.1, mask=255.255.255.255, port=3389, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd82833e0, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2736279, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd3dcf6d8, priority=20, domain=lu, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=17487, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd8faa508, priority=12, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5161, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,WAN) tcp 1.1.1.1 3389 172.16.0.229 3389 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match tcp inside host 172.16.0.229 eq 3389 WAN any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1/3389&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 5&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xd8d8dfc8, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4, user_data=0xd8d52478, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=172.16.0.229, mask=255.255.255.255, port=3389, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,WAN) tcp 1.1.1.1 3389 172.16.0.229 3389 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match tcp inside host 172.16.0.229 eq 3389 WAN any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1/3389&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 5&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd8aa7500, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=9, user_data=0xd8d52478, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=172.16.0.229, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd4d04070, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=20791272, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 21234085, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: WAN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Aug 2011 18:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/publish-a-server-on-an-asa-the-server-is-at-a-remote-location/m-p/1734417#M534394</guid>
      <dc:creator>timothy.lewis</dc:creator>
      <dc:date>2011-08-06T18:45:07Z</dc:date>
    </item>
  </channel>
</rss>

