<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT not working after upgrade in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657011#M557005</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The problem might stem from the order of the nat rules in the nat table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've seen issues like this in the past when you have a nat rule that is something like 'nat (inside,outside) source dynamic obj_any interface' which might be taking precedence over some other object-based inbound PAT translation. This is documented in the ASDM bug "CSCtj78215 - ASDM startup wizard should create after-auto rule for outbound PAT"..check out the release note for it at www.cisco.com/go/bug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide a 'show nat detail' output from the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Apr 2011 03:22:13 GMT</pubDate>
    <dc:creator>Jay Johnston</dc:creator>
    <dc:date>2011-04-28T03:22:13Z</dc:date>
    <item>
      <title>NAT not working after upgrade</title>
      <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657009#M557003</link>
      <description>&lt;P&gt;Hey Techies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just upped our external ASA-5540 pair to 8.4(1), and now one of our nat's is busted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the lowdown:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our public IP for our IronPorts ends in .167.&amp;nbsp; That IP is natted to a VIP on our ACE, which load balances to the IronPorts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outside interface of the ASA uses .162, which has been the pat for all outbound traffic for a few years... except for the subnet that houses the IronPorts.&amp;nbsp; Due to reverse lookup, that subnet uses the .167 IP address for all outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the code upgrade, the nat won't work.&amp;nbsp; No email sent or received.&amp;nbsp; Nothing but Deny's on the ASA with flags reading either "SYN" or "RST".&amp;nbsp; IE:&lt;/P&gt;&lt;P&gt;Apr 27 12:56:11 10.22.151.41 local5.crit %ASA-2-106001: Inbound TCP connection denied from 69.25.174.17/36917 to 207.236.211.167/25 flags SYN&amp;nbsp; on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I return the subnet pat back to the outside interface, then inbound traffic works fine, though reverse lookup fails and anyone running a reasonable spam filter won't send to us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm hoping that rings a bell and some of you will have ready solutions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if more is required.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;mike&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657009#M557003</guid>
      <dc:creator>Network Support</dc:creator>
      <dc:date>2019-03-11T20:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAT not working after upgrade</title>
      <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657010#M557004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you put the pat back to the correct IP and if you go to the next hop router, can you see the arp entry for .167 pointing to the outside interface mac-address of the firewall? If not, can you please try to put an static mac-address with that IP and see if you get mail?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 21:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657010#M557004</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-04-27T21:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: NAT not working after upgrade</title>
      <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657011#M557005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The problem might stem from the order of the nat rules in the nat table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've seen issues like this in the past when you have a nat rule that is something like 'nat (inside,outside) source dynamic obj_any interface' which might be taking precedence over some other object-based inbound PAT translation. This is documented in the ASDM bug "CSCtj78215 - ASDM startup wizard should create after-auto rule for outbound PAT"..check out the release note for it at www.cisco.com/go/bug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide a 'show nat detail' output from the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Apr 2011 03:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657011#M557005</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2011-04-28T03:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT not working after upgrade</title>
      <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657012#M557006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HA-ASA-EX1# sh nat detail&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (dmz-cd) source static obj-10.22.150.0 obj-10.22.150.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 48, untranslate_hits = 3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.150.0/24, Translated: 10.22.150.0/24&lt;BR /&gt;2 (inside) to (outside) source dynamic obj-10.22.242.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 17491, untranslate_hits = 207&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.242.0/24, Translated: 207.236.211.162/27&lt;BR /&gt;3 (inside) to (outside) source dynamic obj-10.22.243.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.243.0/24, Translated: 207.236.211.162/27&lt;BR /&gt;4 (inside) to (outside) source dynamic obj-10.22.150.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 176472, untranslate_hits = 330&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.150.0/24, Translated: 207.236.211.162/27&lt;BR /&gt;&lt;STRONG&gt;5 (inside) to (outside) source dynamic obj-10.22.241.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 113592, untranslate_hits = 430&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.241.0/24, Translated: 207.236.211.162/27&lt;BR /&gt;&lt;/STRONG&gt;6 (inside) to (outside) source dynamic obj-10.22.244.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4292, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.244.0/24, Translated: 207.236.211.162/27&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (dmz-cd) to (outside) source static Connect_Direct-01 CD-Enterprise-Ext&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 7, untranslate_hits = 36888&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.16.3.175/32, Translated: 207.236.211.175/32&lt;BR /&gt;2 (inside) to (outside) source static obj-172.22.2.166 207.236.211.166&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 295, untranslate_hits = 230709&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.166/32, Translated: 207.236.211.166/32&lt;BR /&gt;&lt;STRONG&gt;3 (inside) to (outside) source static obj-172.22.2.167 207.236.211.167&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 6, untranslate_hits = 36526&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.167/32, Translated: 207.236.211.167/32&lt;BR /&gt;&lt;/STRONG&gt;4 (inside) to (outside) source static obj-172.22.2.169 207.236.211.169&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3286, untranslate_hits = 1679533&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.169/32, Translated: 207.236.211.169/32&lt;BR /&gt;5 (inside) to (outside) source static obj-172.22.2.171 207.236.211.171&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1131, untranslate_hits = 569141&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.171/32, Translated: 207.236.211.171/32&lt;BR /&gt;6 (inside) to (outside) source static obj-172.22.2.173 207.236.211.173&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 32, untranslate_hits = 233328&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.173/32, Translated: 207.236.211.173/32&lt;BR /&gt;7 (inside) to (outside) source static obj-172.22.2.174 207.236.211.174&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 695&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.174/32, Translated: 207.236.211.174/32&lt;BR /&gt;8 (inside) to (outside) source static obj-172.22.2.185 207.236.211.185&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 78, untranslate_hits = 30990&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.185/32, Translated: 207.236.211.185/32&lt;BR /&gt;9 (inside) to (outside) source static obj-172.22.2.186 207.236.211.186&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 25834&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.186/32, Translated: 207.236.211.186/32&lt;BR /&gt;10 (inside) to (outside) source static obj-172.22.3.168 207.236.211.168&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 721, untranslate_hits = 472794&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.168/32, Translated: 207.236.211.168/32&lt;BR /&gt;11 (inside) to (outside) source static obj-172.22.3.170 207.236.211.170&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 261&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.170/32, Translated: 207.236.211.170/32&lt;BR /&gt;12 (inside) to (outside) source static obj-172.22.3.176 207.236.211.176&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 5, untranslate_hits = 88513&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.176/32, Translated: 207.236.211.176/32&lt;BR /&gt;13 (inside) to (outside) source static obj-172.22.3.178 207.236.211.178&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 52, untranslate_hits = 57354&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.178/32, Translated: 207.236.211.178/32&lt;BR /&gt;14 (inside) to (outside) source static obj-172.22.3.179 207.236.211.179&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 9359, untranslate_hits = 5730489&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.179/32, Translated: 207.236.211.179/32&lt;BR /&gt;15 (inside) to (outside) source static obj-172.22.3.180 207.236.211.180&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 5780, untranslate_hits = 2673943&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.180/32, Translated: 207.236.211.180/32&lt;BR /&gt;16 (inside) to (outside) source static obj-172.22.3.181 207.236.211.181&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 74, untranslate_hits = 2582&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.181/32, Translated: 207.236.211.181/32&lt;BR /&gt;17 (inside) to (outside) source static obj-172.22.3.182 207.236.211.182&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 528510&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.182/32, Translated: 207.236.211.182/32&lt;BR /&gt;18 (inside) to (outside) source static obj-172.22.3.183 207.236.211.183&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 253, untranslate_hits = 166592&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.183/32, Translated: 207.236.211.183/32&lt;BR /&gt;19 (inside) to (outside) source static obj-172.22.3.187 207.236.211.187&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3, untranslate_hits = 702&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.3.187/32, Translated: 207.236.211.187/32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I highlighted the two pertinent policies... the 241 outbound pat using the interface ip address (which is currently 162, but must change to 167);&amp;nbsp; and the static nat translating the 167 public IP address to the internal 172.22.2.167 VIP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also attached a screenshot of the same from within ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Apr 2011 12:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657012#M557006</guid>
      <dc:creator>Network Support</dc:creator>
      <dc:date>2011-04-28T12:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT not working after upgrade</title>
      <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657013#M557007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, order was the ticket.&amp;nbsp; Good call.&amp;nbsp; I deleted the static nat from Section 2 in the nat detail output, and recreated it in Section 1, moving it above the generic outbound pat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New output for sh nat det:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HA-ASA-EX1# sh nat detail&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (dmz-cd) source static obj-10.22.150.0 obj-10.22.150.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 48, untranslate_hits = 3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.150.0/24, Translated: 10.22.150.0/24&lt;BR /&gt;&lt;STRONG&gt;2 (inside) to (any) source static 172.22.2.167 obj-207.236.211.167&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 260&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.167/32, Translated: 207.236.211.167/32&lt;BR /&gt;&lt;/STRONG&gt;3 (inside) to (outside) source dynamic obj-10.22.242.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 17733, untranslate_hits = 207&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.242.0/24, Translated: 207.236.211.162/27&lt;BR /&gt;4 (inside) to (outside) source dynamic obj-10.22.243.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.243.0/24, Translated: 207.236.211.162/27&lt;BR /&gt;5 (inside) to (outside) source dynamic obj-10.22.150.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 177339, untranslate_hits = 330&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.150.0/24, Translated: 207.236.211.162/27&lt;BR /&gt;&lt;STRONG&gt;6 (inside) to (outside) source dynamic obj-10.22.241.0 obj-207.236.211.167&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 868, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.241.0/24, Translated: 207.236.211.167/32&lt;BR /&gt;&lt;/STRONG&gt;7 (inside) to (outside) source dynamic obj-10.22.244.0 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.244.0/24, Translated: 207.236.211.162/27&lt;/P&gt;&lt;P&gt;No errors/denies in the syslogs, and header information shows correct .167 IP address, so reverse lookup is good to go.&lt;/P&gt;&lt;P&gt;Good lesson learned.&amp;nbsp; Thanks for the direction.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Apr 2011 13:07:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657013#M557007</guid>
      <dc:creator>Network Support</dc:creator>
      <dc:date>2011-04-28T13:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: NAT not working after upgrade</title>
      <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657014#M557008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm glad things are working better now, and that re-ordering things worked to mitigate the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some things I noticed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2 (inside) to (any) source static 172.22.2.167 obj-207.236.211.167&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 260&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.22.2.167/32, Translated: 207.236.211.167/32&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that it is translating from interface (inside) to interface (any). You might want to make this more specific, so that it is translating from (inside) to (outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, line 2 (shown above) is a one-to-one NAT translation, but then farther down, this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;6 (inside) to (outside) source dynamic obj-10.22.241.0 obj-207.236.211.167&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 868, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.22.241.0/24, Translated: 207.236.211.167/32&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is a many-to-one PAT translation to the same global IP. This might be working fine (and it might work forever with no trouble) but it struck me as odd. It might be a good idea to make the first one-to-one translation a static PAT instead of a static NAT statement, which would avoid any overlap between line 2 and line 6. You could do it like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static obj-207.236.211.167 obj-172.22.2.167 service tcp-smtp tcp-smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way, just port 25 is forwarded from the .167 global IP to the inside server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Apr 2011 14:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657014#M557008</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2011-04-28T14:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT not working after upgrade</title>
      <link>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657015#M557009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Done... as you suggested.&amp;nbsp; Thanks for the tip.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 14:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-not-working-after-upgrade/m-p/1657015#M557009</guid>
      <dc:creator>Network Support</dc:creator>
      <dc:date>2011-04-29T14:01:34Z</dc:date>
    </item>
  </channel>
</rss>

