<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-static-nat/m-p/1712893#M534548</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm having a strange issue and appreciate if anyone have faced simillar issue and got some solution/workaround.&lt;/P&gt;&lt;P&gt;I have static nat (inside,outside) and allowed all the required ports accessing from outside via ACL applied on outisde interface in direction. firewall nat-control is enabled. when I tried packet tracer i got the attached output. (step 8, nat-exeception - Drop). However when I change the inside ip (which is already having static nat entry with outside, but just for testing) it worked..? I have required routing, gateway for inside server is the firewall inside, no any host routes in the inside server in question.&lt;/P&gt;&lt;P&gt;The issue I see here is that when ever you used new static entry it does not work..???? has anyone faced simillar problem and can get some idea..? &lt;/P&gt;&lt;P&gt;Attached file contain the relevant configuraiton and packet tracer output for working and non working IPs (working IP inside is 172.16.1.125 and non working ip is 172.28.1.196).&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:06:06 GMT</pubDate>
    <dc:creator>pemasirid</dc:creator>
    <dc:date>2019-03-11T21:06:06Z</dc:date>
    <item>
      <title>ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-nat/m-p/1712893#M534548</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm having a strange issue and appreciate if anyone have faced simillar issue and got some solution/workaround.&lt;/P&gt;&lt;P&gt;I have static nat (inside,outside) and allowed all the required ports accessing from outside via ACL applied on outisde interface in direction. firewall nat-control is enabled. when I tried packet tracer i got the attached output. (step 8, nat-exeception - Drop). However when I change the inside ip (which is already having static nat entry with outside, but just for testing) it worked..? I have required routing, gateway for inside server is the firewall inside, no any host routes in the inside server in question.&lt;/P&gt;&lt;P&gt;The issue I see here is that when ever you used new static entry it does not work..???? has anyone faced simillar problem and can get some idea..? &lt;/P&gt;&lt;P&gt;Attached file contain the relevant configuraiton and packet tracer output for working and non working IPs (working IP inside is 172.16.1.125 and non working ip is 172.28.1.196).&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-nat/m-p/1712893#M534548</guid>
      <dc:creator>pemasirid</dc:creator>
      <dc:date>2019-03-11T21:06:06Z</dc:date>
    </item>
    <item>
      <title>ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-nat/m-p/1712894#M534549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The connection to 172.16.125.25 fails because of the NAT RPF check. This check requires that the forward flow (client -&amp;gt; server) matches the same NAT rules as the reverse flow (server -&amp;gt; client). You should double check your NAT rules and see which ones match for when 172.28.1.196 talks to 172.16.65.48. If you have trouble spotting the overlap, please share a sanitized copy of 'show run nat', 'show run global', and 'show run static'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Aug 2011 15:25:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-nat/m-p/1712894#M534549</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-08-05T15:25:28Z</dc:date>
    </item>
  </channel>
</rss>

