<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Outside traffic to either inside host or host on existing si in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647991#M558732</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you specify a range of ports?&amp;nbsp; How can I pick the correct port if I don't know what value my lab machine is going to choose for the source port?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Apr 2011 17:28:42 GMT</pubDate>
    <dc:creator>petes</dc:creator>
    <dc:date>2011-04-05T17:28:42Z</dc:date>
    <item>
      <title>Outside traffic to either inside host or host on existing site-to-site IPsec VPN</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647982#M558723</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have an ASA 5510 that is setup in the following manner.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Internet -----&amp;gt;&amp;nbsp; "outside" ASA interface ----&amp;gt; [ASA] --&amp;gt;&amp;nbsp; "private" ASA Interface -- 192.168.1.1/24 network --&amp;gt; Router --&amp;gt; 10.0.0.0 network &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have a web server that sits on the 10.0.0.0/24 network.&amp;nbsp; HTTP traffic hits the public IP address 1.1.1.1 and which gets translated to the 10.0.0.1 IP address of the web server.&amp;nbsp; After the NAT takes place, there is a route to the 10.0.0.0/24 network pointing to the private interface and the traffic is routed to the web server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;This works fine and is how our normal behavior occurs.&amp;nbsp; I also have a site-to-site VPN established between the outside interface of the ASA and another private network that also has routes to the 10.0.0.0/24 network via other routing devices.&amp;nbsp; This is setup as redundancy in case anything happens to the router between the 192.168.1.1/24 and 10.0.0.0/24 networks. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;If that router was to go down, the ASA will receive a new route to the 10.0.0.0/24 network that points traffic to the VPN connection.&amp;nbsp; This works fine for communication between the 192.168.1.1/24 and 10.0.0.0/24 networks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;My problem is that web traffic originated from the Internet will not go across the VPN to take the new path to the web server.&amp;nbsp; I want the traffic to arrive at the outside interface of the firewall, have the destination address translated to 10.0.0.1, see that the route to this network is over the VPN and sent across the VPN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Has anyone setup something like this before?&amp;nbsp; Most of the examples I see are related to clients connecting to the VPN and then hairpinning back out the outside interface for internet traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;When I view the logs on the ASA I see that the traffic is NAT'd to the 10.0.0.1 IP but then it says that no route can be found.&amp;nbsp; I think this has to do with the fact that the static NAT rule goes from OUTSIDE to PRIVATE but the route on the ASA shows the destination accessible via the Outside interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Hopefully I've explained my predicament well enough for you to understand exactly what I'm trying.&amp;nbsp; I've not had any luck finding the correct search phrase to find others with this same problem on google&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I would greatly appreciate any insights or assistance.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:15:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647982#M558723</guid>
      <dc:creator>petes</dc:creator>
      <dc:date>2019-03-11T20:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647983#M558724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you have the following static NAT command for your web server&lt;/P&gt;&lt;P&gt;static (private,outside) 1.1.1.1 10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested it on ASA, when the traffic to 1.1.1.1 makes a U-turn on outside interface, the above STATIC entry is applied twice. So, the destination IP was translated from 1.1.1.1 to 10.0.0.1 when the traffic reach outside interface. Then since route points 10.0.0.1 to outside interface, the packet will make U-turn here (you need enable "same-security-traffic permit intra-interface"), the above static NAT is applied again and IP is translated back to 1.1.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output.&lt;/P&gt;&lt;P&gt;ciscoasa# sh run static&lt;BR /&gt;static (inside,outside) 1.1.1.1 10.0.0.1 netmask 255.255.255.255 &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# sh run route&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.16.182.65 1&lt;BR /&gt;route outside 10.0.0.1 255.255.255.255 172.16.182.88 1&lt;BR /&gt;ciscoasa# &lt;BR /&gt;ciscoasa# packet-tracer input outside tcp 172.16.182.88 2222 1$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) 1.1.1.1 10.0.0.1 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip inside host 10.0.0.1 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 1.1.1.1/0 to 10.0.0.1/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;access-list outside extended permit ip any any &lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) 1.1.1.1 10.0.0.1 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip inside host 10.0.0.1 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) 1.1.1.1 10.0.0.1 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip inside host 10.0.0.1 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 41, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could not see any way not to let Static NAT be applied again on the U-turn traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, you can try the workaround by including the traffic from any to 1.1.1.1 in VPN tunnel and then translate 1.1.1.1 to 10.0.0.1 at the other end of the vpn tunnel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Apr 2011 20:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647983#M558724</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-04-01T20:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647984#M558725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static NAT is not actually applied again to the traffic.&lt;/P&gt;&lt;P&gt;What you see in the packet tracer is it checking host-limits and rpf. There will be no sub-type mentioned if the NAT is applied, and also there will be an increment on the translate_hits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way to get this working, I think, would be to append the crypto ACLs with &lt;STRONG&gt;permit ip any host 10.0.0.1&lt;/STRONG&gt; on this ASA, and the reverse on the other.&lt;/P&gt;&lt;P&gt;That way the traffic would match the crypto map after being un-natted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Please mark the question resolved if it has been aswered. Do rate helpful posts. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2011 00:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647984#M558725</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-04T00:49:42Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647985#M558726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to what i mentioned above, we would also need to change the static nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current static nat would be: &lt;STRONG&gt;static (inside,outside) 1.1.1.1 10.0.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;On router failure, this should be replaced by: &lt;STRONG&gt;static (outside,outside) 1.1.1.1 10.0.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly, I don't think this can be automated.&lt;/P&gt;&lt;P&gt;Note: Both statics can be added together, however, the first one in the output of "show nat" will always be hit first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Please mark the question resolved if it has been aswered. Do rate helpful posts. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2011 01:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647985#M558726</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-04T01:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647986#M558727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;SPAN style="font-size: 11pt; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Shrikant is correct. I mis-read the packet-tracer output.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2011 03:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647986#M558727</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-04-04T03:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647987#M558728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hear what you're saying about not being able to automate the different static NAT statements.&amp;nbsp; What's strange is that even if I alter the static NAT to (outside,outside) it still doesn't work.&amp;nbsp; If I leave it (private,outside) then I get some error about the inability to locate a route.&amp;nbsp; This is because the route is pointing to the outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping that it would NAT the traffic to the private IP address and then consult it's routing table and see the path is actually accross the VPN.&amp;nbsp; I guess that would have been too easy.&amp;nbsp; Instead, because it's NAT'ing to a Private IP address it wants to send out that interface at all costs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems strange that this firewall doesn't provide the ability that I'm trying to obtain.&amp;nbsp; Am I the only person that has configured a VPN to provide an alternate path to a web server?&amp;nbsp; I guess I'm going to have to install another ASA on the same segments and run the site-to-site VPN through this appliance.&amp;nbsp; It will participate in OSPF advertisements and when the traffic comes in the primary ASA, it will always have a route via the Private interface.&amp;nbsp; That would will either be to my router or to my new ASA that is providing the VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are your thoughts???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 15:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647987#M558728</guid>
      <dc:creator>petes</dc:creator>
      <dc:date>2011-04-05T15:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647988#M558729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pete,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I managed to get your scenario working in the lab.&lt;/P&gt;&lt;P&gt;The static un-nat always forces traffic out of the other interface configured within parenthesis.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please confirm that you removed the original static (private, outside) before adding the static (outside,outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also run the packet-tracer after adding static (outside,outside)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 4.2.2.2 8888 &lt;SERVER&gt; &lt;PORT&gt; detail&lt;/PORT&gt;&lt;/SERVER&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and attach the output. If we see a phase called VPN, means the traffic was categorized to go over the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you also modify the crypto maps, as i had mentioned in the previous post?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 16:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647988#M558729</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-05T16:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647989#M558730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I'll double check the crypto map ACL.&amp;nbsp; This may be a stupid question but when I run the packet capture and have to specify the&lt;/P&gt;&lt;P&gt;source port, how can I control that being that it is dynamically generated when I hit refresh on the browser?&amp;nbsp; Does the 8888 signify&lt;/P&gt;&lt;P&gt;any port?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 17:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647989#M558730</guid>
      <dc:creator>petes</dc:creator>
      <dc:date>2011-04-05T17:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647990#M558731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nah. I chose 8888 randomly &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You can use any port above 1024..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 17:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647990#M558731</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-05T17:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647991#M558732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you specify a range of ports?&amp;nbsp; How can I pick the correct port if I don't know what value my lab machine is going to choose for the source port?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 17:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647991#M558732</guid>
      <dc:creator>petes</dc:creator>
      <dc:date>2011-04-05T17:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647992#M558733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can choose any port from 1024-65535. A test packet is generated and its flow moniotred across the ASA.&lt;/P&gt;&lt;P&gt;It doesn't matter which port the test PC uses when you test from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you run the packet-tracer command, it creates a packet with those specifications and assumes it came on the interface mentioned after &lt;STRONG&gt;input&lt;/STRONG&gt; in the packet-tracer. Then it traces how the packet moves across various phases in the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this clarifies how the packet-tracer works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 17:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647992#M558733</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-05T17:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647993#M558735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, I am super excited about that packet-tracer command.&amp;nbsp; That's going to make my life a lot easier, thanks!&amp;nbsp; I thought you had to tell it what to look for and then generate the packets yourself.&amp;nbsp; I can see that it tries to get to the VPN but I've got an outbound NAT rule that is dropping the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, it's good to know that this problem can be solved with hairpinning.&amp;nbsp; Anybody have any ideas on how I could allow normal traffic to flow from the outside to the inside and eventually to the web server while all links are up and then have that traffic dynamically start using the VPN as an alternate path when there is a disruption that blocks the traditional path to the server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 19:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647993#M558735</guid>
      <dc:creator>petes</dc:creator>
      <dc:date>2011-04-05T19:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Outside traffic to either inside host or host on existing si</title>
      <link>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647994#M558736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pete,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic to return from inside, you would need to have a device which does routing on the inside.&lt;/P&gt;&lt;P&gt;This router, should have the failover routes too, and send device back to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA can then send the traffic over the vpn. However, you would need to disable reverse path check, since outside ip addresses would be seen to appear from the inside, and ASA would drop them thinking those packets are spoofed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Please mark the question resolved, if it has been answered. Do rate helpful posts. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Apr 2011 20:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-traffic-to-either-inside-host-or-host-on-existing-site/m-p/1647994#M558736</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-05T20:32:07Z</dc:date>
    </item>
  </channel>
</rss>

